Your message dated Tue, 07 Jun 2005 21:21:36 -0600
with message-id <[EMAIL PROTECTED]>
and subject line Closing this woody php4 bug, please upgrade.
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 30 Mar 2001 17:42:24 +0000
>From [EMAIL PROTECTED] Fri Mar 30 11:42:24 2001
Return-path: <[EMAIL PROTECTED]>
Received: from mailout03.sul.t-online.com [194.25.134.81]
by master.debian.org with esmtp (Exim 3.12 1 (Debian))
id 14j2ul-0000GI-00; Fri, 30 Mar 2001 11:42:24 -0600
Received: from fwd03.sul.t-online.com
by mailout03.sul.t-online.com with smtp
id 14j2ui-00089e-00; Fri, 30 Mar 2001 19:42:20 +0200
Received: from dual.intern.brederlow.de ([EMAIL PROTECTED]) by
fmrl03.sul.t-online.com
with esmtp id 14j2ua-1RP5sGC; Fri, 30 Mar 2001 19:42:12 +0200
Received: from mrvn by dual.intern.brederlow.de with local (Exim 3.22 #1
(Debian))
id 14j2uW-0002q3-00; Fri, 30 Mar 2001 19:42:08 +0200
From: Goswin Brederlow <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: php4: fopen on remote files has misleading warning
X-Reportbug-Version: 1.14
X-Mailer: reportbug 1.14
Date: Fri, 30 Mar 2001 19:42:07 +0200
Message-Id: <[EMAIL PROTECTED]>
Sender: Goswin Brederlow <[EMAIL PROTECTED]>
X-Sender: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
Package: php4
Version: 4.0.4.5rc2-1
Severity: normal
When I try to fopen a remote file on a server that needs user:pass I
get the following:
Warning: fopen("http://mrvn.yi.org/","r") - Success in
/var/www/admin-newEpisode.html on line 92
Unable to open http://mrvn.yi.org/
The php code is as follows:
if (isset($seenBefore)) {
$file = fopen("http://".$server.$path, "r");
if (!$file) {
echo "<P>Unable to open http://".$server.$path."</P>";
} else {
fclose($file);
}
This on the other hand works fine:
$file =
fopen("http://".$PHP_AUTH_USER.":".$PHP_AUTH_PW."@".$server.$path, "r");
The warning is misleading and a "Warning: access denied" would be
better there.
MfG
Goswin
-- System Information
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux dual 2.4.2 #14 SMP Fri Mar 9 16:35:03 CET 2001 i686
Versions of packages php4 depends on:
ii apache-common 1.3.19-1 Support files for all Apache webse
ii fileutils 4.0.43-1 GNU file management utilities.
ii libbz2-1.0 1.0.1-6 A high-quality block-sorting file
ii libc6 2.2.2-4 GNU C Library: Shared libraries an
ii libdb2 2:2.7.7-4 The Berkeley database routines (ru
ii libexpat1 1.95.1-2 XML parsing C library - runtime li
ii libmm11 1.1.3-2 Shared memory library
ii libpam0g 0.72-16 Pluggable Authentication Modules l
ii libpcre3 3.3-5 Philip Hazel's Perl Compatible Reg
ii mime-support 3.10-1 MIME files 'mime.types' & 'mailcap
ii zlib1g 1:1.1.3-13 compression library - runtime
---------------------------------------
Received: (at 92218-done) by bugs.debian.org; 8 Jun 2005 03:21:36 +0000
>From [EMAIL PROTECTED] Tue Jun 07 20:21:36 2005
Return-path: <[EMAIL PROTECTED]>
Received: from s010600e029962405.cg.shawcable.net (lucifer.0c3.net)
[68.147.203.152] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1Dfr8K-0000S8-00; Tue, 07 Jun 2005 20:21:36 -0700
Received: from adconrad by lucifer.0c3.net with local (Exim 3.36 #1 (Debian))
id 1Dfr8K-0003ft-00
for <[EMAIL PROTECTED]>; Tue, 07 Jun 2005 21:21:36 -0600
To: [EMAIL PROTECTED]
Subject: Closing this woody php4 bug, please upgrade.
Message-Id: <[EMAIL PROTECTED]>
From: Adam Conrad <[EMAIL PROTECTED]>
Date: Tue, 07 Jun 2005 21:21:36 -0600
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
X-CrossAssassin-Score: 14
This bug was tagged "woody" and is believed to have been corrected in our
new stable release "sarge", which was released[1] two days ago.
As a result of sarge's release, I am closing this woody bug, and I would
encourage you to upgrade to sarge as soon as is reasonably possible. While
you're at it, if you are currently using php4 with apache1.3, I would
suggest upgrading to apache2 (package: apache2-mpm-prefork) and the php4
build for apache2 (libapache2-mod-php4), as apache1.3 is now deprecated,
and the apache2/php4 combinations seems to exhibit fewer bugs and strange
behaviours overall than apache1.3/php4.
Thanks for using Debian,
... Adam Conrad
PS: If you want your upgrades to go as smoothly as possible, please remember
to read the release notes[2] and to use a packaging frontend like
aptitude or dselect, rather than a raw 'apt-get dist-upgrade', which will
often go rather badly on a complex setup.
[1] http://www.debian.org/News/2005/20050606
[2] http://www.debian.org/releases/sarge/releasenotes
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]