PHP 8 has been the biggest change to PHP in years. While PHP 8’s JIT compiler gets most of the publicity, more significant to most developers would be PHP 8’s changes that encourage better coding practices. PHP 8 pushes developers to use clearer syntax and is stricter with problematic code. While the PHP runtime itself has improved, what about extensions such as ibm_db2? What changes do extension developers need to make to adapt to PHP 8? As maintainers of the ibm_db2 and PDO_IBM database extensions, we’ve learned what it takes to make PHP extensions compatible with PHP 8.
Author Archive for: Calvin Buckley
About Calvin Buckley
Recognized by IBM as a 2020 Fresh Face of IBM i, Calvin exhibits remarkable talent for expanding the use of IBM i through open source development. Upon joining Seiden Group in early 2020, he turned his skills to re-engineering popular PHP modules to work with the new 64-bit Community PHP, helping our customers avoid application rewrites when continuing with the free use of PHP on IBM i. Calvin’s deep knowledge of the PASE environment on IBM i makes him a valuable member of our support team. If it’s broken, he can fix it.
Secure Shell (SSH) provides the best environment for installing, managing, and running open source software on IBM i. Among SSH’s advantages over QSHELL and QP2TERM: IBM i’s SSH command line works just like SSH on Linux or Windows, helping the IBM i platform appeal to younger developers and admins. Supporting a wide range of Unix programs and open source software, such as git, SSH is our go-to terminal interface for open source and PASE. This article covers how to set up SSH and use it to connect to IBM i servers.
If you’re running web applications, database servers, FTP, SSH, or other network programs, the IBM i NETSTAT command can tell you what is connecting to your system, which ports are in use, which programs are listening for network connections, and more.
In our current work with RPMs, we’re adding digital signatures to our PHP packages to enhance their security. Package Signing ensures the integrity of a package at rest by detecting and deterring tampering. A package is signed with a private key, which is then validated by the public key provided by the package builder and installed by the user. This technique complements TLS encryption, which guards against tampering and snooping in transport.