Re: E_STRICT safe PEAR

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 24.07.2012 18:46, schrieb Lester Caine:
Sebastian Krebs wrote:
Hi,

I'm using Ubuntu, but here you can update the "system packages" with
the pear
executable too

$ sudo pear update-channels && sudo pear upgrade --alldeps

The question is - Is the result E_STRICT safe?

Would say: Depends on the package you use. I don't use PEAR-packages myself, thus I don't really know. I would say: Try it out :) Test it on your dev-machine, or within a vm and nothing can break.

I've got what I think is the latest from SUSE12.1 but with PHP5.4 I have
to disable E_STRICT again in order to use anything from it ...

Regards,
Sebastian

Am 24.07.2012 17:05, schrieb Lester Caine:
Not sure the best place to ask this ...

I've worked through all of my own codebase to eliminate E_STRICT
warnings/errors and now I'm working on the more basic ones coming from
PEAR such as
PHP Strict Standards:  Non-static method PEAR::isError() should not be
called statically

Since these are installed by the distribution, in my case SUSE12.1, is
there a better version to download that is E_STRICT clean? Or o I h2ve
to work through that as well for the modules that the third party
libraries are picking up?







--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php



[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux