Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:108664 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 71859 invoked from network); 19 Feb 2020 15:51:09 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 19 Feb 2020 15:51:09 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 33CF6180533 for ; Wed, 19 Feb 2020 06:07:04 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS29169 217.70.176.0/20 X-Spam-Virus: No X-Envelope-From: Received: from relay12.mail.gandi.net (relay12.mail.gandi.net [217.70.178.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 19 Feb 2020 06:07:03 -0800 (PST) Received: from samurai.attlocal.net (107-223-28-39.lightspeed.nsvltn.sbcglobal.net [107.223.28.39]) (Authenticated sender: pmjones@pmjones.io) by relay12.mail.gandi.net (Postfix) with ESMTPSA id 35B64200016; Wed, 19 Feb 2020 14:07:00 +0000 (UTC) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.60.0.2.5\)) In-Reply-To: <50BD013E-CF72-414C-BBC0-A7A2E45CBDDB@pmjones.io> Date: Wed, 19 Feb 2020 08:06:59 -0600 Cc: internals@lists.php.net Content-Transfer-Encoding: quoted-printable Message-ID: <50CF1E61-1EF9-4D2C-AEE2-D98E1CFF6F40@pmjones.io> References: <50BD013E-CF72-414C-BBC0-A7A2E45CBDDB@pmjones.io> To: "Paul M. Jones" X-Mailer: Apple Mail (2.3608.60.0.2.5) Subject: Re: [PHP-DEV] RFC: Server-Side Request and Response Objects (v2) From: pmjones@pmjones.io ("Paul M. Jones") Hi all, Per the past several days of discussion, John Boehr and I have modified = the proposal: - ServerRequest - The `$env` property mapping to `$_ENV` has been removed - The `$requestedWith` property mapping to = `$_SERVER['HTTP_X_REQUESTED_WITH']` has been removed - The superglobal `$_GET` now maps to the property `$query` (instead = of `$get`) - The superglobal `$_POST` now maps to the property `$input` = (instead of `$post`) - A new interface, ServerResponseInterface, is now available; = ServerResponse implements it There are still outstanding comments and questions yet to be resolved. Thanks to everyone who has participated thus far! --=20 Paul M. Jones pmjones@pmjones.io http://paul-m-jones.com Modernizing Legacy Applications in PHP https://leanpub.com/mlaphp Solving the N+1 Problem in PHP https://leanpub.com/sn1php