[hhvm] remove session serialize handler hack
This commit is contained in:
parent
1153cfc9d4
commit
3aa1892121
@ -56,14 +56,7 @@ class SessionProvider implements MessageComponentInterface, WsServerInterface {
|
||||
$this->setOptions($options);
|
||||
|
||||
if (null === $serializer) {
|
||||
// Temporarily fixing HHVM issue w/ reading ini values
|
||||
$handler_name = ini_get('session.serialize_handler');
|
||||
if ('' === $handler_name) {
|
||||
trigger_error('ini value session.seralize_handler was empty, assuming "php" - tmp hack/fix, bad things might happen', E_USER_WARNING);
|
||||
$handler_name = 'php';
|
||||
}
|
||||
|
||||
$serialClass = __NAMESPACE__ . "\\Serialize\\{$this->toClassCase($handler_name)}Handler"; // awesome/terrible hack, eh?
|
||||
$serialClass = __NAMESPACE__ . "\\Serialize\\{$this->toClassCase(ini_get('session.serialize_handler'))}Handler"; // awesome/terrible hack, eh?
|
||||
if (!class_exists($serialClass)) {
|
||||
throw new \RuntimeException('Unable to parse session serialize handler');
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user