ID: 27076
Updated by: [EMAIL PROTECTED]
Reported By: not at valid dot email
-Status: Open
+Status: Closed
Bug Type: Documentation problem
Operating System: linux
PHP Version: Irrelevant
New Comment:
This bug has been fixed in the documentation's XML sources. Since the
online and downloadable versions of the documentation need some time
to get updated, we would like to ask you to be a bit patient.
Thank you for the report, and for helping us make our documentation
better.
Added the entity [EMAIL PROTECTED] created to passthru() and system().
Previous Comments:
------------------------------------------------------------------------
[2004-02-09 09:47:24] [EMAIL PROTECTED]
This should also be mentionned in the other functions of ref.exec.
Maybe with an entity ?
------------------------------------------------------------------------
[2004-01-28 15:03:42] [EMAIL PROTECTED]
This bug has been fixed in the documentation's XML sources. Since the
online and downloadable versions of the documentation need some time
to get updated, we would like to ask you to be a bit patient.
Thank you for the report, and for helping us make our documentation
better.
I added a warning below the other safe_mode note. Thanks.
------------------------------------------------------------------------
[2004-01-28 14:53:20] [EMAIL PROTECTED]
Yes, it's a feature. Couldn't find it documented anywhere.
Reclassifed as documentation problem.
------------------------------------------------------------------------
[2004-01-28 12:39:16] not at valid dot email
Description:
------------
safe_mode cause exec command to parse all arguments after the command
as one argument (in quote?)
Is this a bug? is it documented somewhere?
Reproduce code:
---------------
<?php
exec("echo x | echo y",$output);
$output=implode(',',$output);
echo "output is: $output"
?>
Expected result:
----------------
safe_mode off output is: y
safe_mode on output is: y
Actual result:
--------------
safe_mode off output is: y
safe_mode on output is: x | echo y
------------------------------------------------------------------------
--
Edit this bug report at http://bugs.php.net/?id=27076&edit=1