Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:108524 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 13911 invoked from network); 13 Feb 2020 00:32:12 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 13 Feb 2020 00:32:12 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id CEF301804F8 for ; Wed, 12 Feb 2020 14:46:27 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS29169 217.70.176.0/20 X-Spam-Virus: No X-Envelope-From: Received: from relay6-d.mail.gandi.net (relay6-d.mail.gandi.net [217.70.183.198]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 12 Feb 2020 14:46:26 -0800 (PST) X-Originating-IP: 107.223.28.39 Received: from samurai.attlocal.net (107-223-28-39.lightspeed.nsvltn.sbcglobal.net [107.223.28.39]) (Authenticated sender: pmjones@pmjones.io) by relay6-d.mail.gandi.net (Postfix) with ESMTPSA id 8E85FC0004; Wed, 12 Feb 2020 22:46:24 +0000 (UTC) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) In-Reply-To: <3efc8ed3-61a8-dad8-dd1f-207217589eba@allenjb.me.uk> Date: Wed, 12 Feb 2020 16:46:22 -0600 Cc: PHP Internals List Content-Transfer-Encoding: quoted-printable Message-ID: References: <50BD013E-CF72-414C-BBC0-A7A2E45CBDDB@pmjones.io> <3efc8ed3-61a8-dad8-dd1f-207217589eba@allenjb.me.uk> To: AllenJB , "Kingsquare.nl - Robin Speekenbrink" X-Mailer: Apple Mail (2.3608.60.0.2.5) Subject: Re: [PHP-DEV] RFC: Server-Side Request and Response Objects (v2) From: pmjones@pmjones.io ("Paul M. Jones") Hi Allen & Robin, Allen, you asked: > On Feb 12, 2020, at 15:27, AllenJB wrote: >=20 > This might be more a "future scope" thing, but I would like to see a = way to access the raw request body as part of this. Currently (as far as = I know) the only way is to open/read php://input, which isn't = particularly intuitive in my opinion. Robin asked the same thing earlier: > On Feb 11, 2020, at 08:24, Kingsquare.nl - Robin Speekenbrink = wrote: >=20 > What i haven't clearly seen in the RFC nor the interfaces of the = proposed objects: how will this handle PUT / php:://input / raw posted = data? Or am i missing something? Answer: the php://input stream is accessible via the ServerRequest = $content property; see = . --=20 Paul M. Jones pmjones@pmjones.io http://paul-m-jones.com Modernizing Legacy Applications in PHP https://leanpub.com/mlaphp Solving the N+1 Problem in PHP https://leanpub.com/sn1php