Am 24.07.2012 18:46, schrieb Lester Caine:
Sebastian Krebs wrote:

I'm using Ubuntu, but here you can update the "system packages" with
the pear
executable too

$ sudo pear update-channels && sudo pear upgrade --alldeps

The question is - Is the result E_STRICT safe?

Would say: Depends on the package you use. I don't use PEAR-packages myself, thus I don't really know. I would say: Try it out :) Test it on your dev-machine, or within a vm and nothing can break.

I've got what I think is the latest from SUSE12.1 but with PHP5.4 I have
to disable E_STRICT again in order to use anything from it ...


Am 24.07.2012 17:05, schrieb Lester Caine:
Not sure the best place to ask this ...

I've worked through all of my own codebase to eliminate E_STRICT
warnings/errors and now I'm working on the more basic ones coming from
PEAR such as
PHP Strict Standards:  Non-static method PEAR::isError() should not be
called statically

Since these are installed by the distribution, in my case SUSE12.1, is
there a better version to download that is E_STRICT clean? Or o I h2ve
to work through that as well for the modules that the third party
libraries are picking up?

PHP General Mailing List (
To unsubscribe, visit:

Reply via email to