Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:105699 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 51955 invoked from network); 14 May 2019 16:46:42 -0000 Received: from unknown (HELO box.beccati.com) (176.9.123.236) by pb1.pair.com with SMTP; 14 May 2019 16:46:42 -0000 Received: from authenticated-user (box.beccati.com [176.9.123.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by box.beccati.com (Postfix) with ESMTPSA id 0E7382002E4; Tue, 14 May 2019 15:52:20 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=beccati.com; s=mail; t=1557841941; bh=LgC40bF9DPTjns0iTFxGxH8UYesk3GJV/s66qqP3tq8=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=VdYMHdjhDO3c5uW6sAGBO0Fu62ZY1OfIstYnBne7bjJsp2J28oSVuIKOyWGdxPF6S QkYxad6bd1fwRejberwxs82npFHw+bGzzMk0Wbg0wPt9kJC2aoSo4HmgYkw52WDQXp xZiYU61lyCgV0SlaH4jnwHQlFYVxvw8h11D3yXFISDLN1vTX1VU/pfMr4FlU9/JeB9 EO/ghDVVU1pCpSlgTFNuoIXY59OJqDjcDICGe0bdN9APA09mW0wXBjOl6a4NgQ7rs5 LDSqvwOCC65GIhw7JqqmamRv6oJDQH1b1P9ci0Fy8oXB/dlY9U0rzcBmIta8wl90Hk Xg/gPVGcch6Ug== To: Nikita Popov , Andreas Heigl Cc: PHP internals References: Message-ID: <916eb56a-3336-9e65-0f70-f1557975544d@beccati.com> Date: Tue, 14 May 2019 15:52:18 +0200 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] Re: [RFC] Allow throwing exceptions from __toString() From: php@beccati.com (Matteo Beccati) Hi Nikita, On 14/05/2019 12:44, Nikita Popov wrote: > The target is 7.4 because the BC break is minimal and largely theoretical. > I think the main affected code will be Symfony's existing hack around the > issue -- they'll have to disable the hack for PHP >= 7.4 and just use the > native support. How would the change affect extension developers? Cheers -- Matteo Beccati Development & Consulting - http://www.beccati.com/