Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:113150 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 31036 invoked from network); 12 Feb 2021 00:50:51 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 12 Feb 2021 00:50:51 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 94FAA1804CF for ; Thu, 11 Feb 2021 16:36:27 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HTML_MESSAGE,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Virus: No X-Envelope-From: Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Thu, 11 Feb 2021 16:36:26 -0800 (PST) Received: by mail-wm1-f52.google.com with SMTP id o15so5330216wmq.5 for ; Thu, 11 Feb 2021 16:36:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=craigfrancis.co.uk; s=default; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=rfrat4Rlxomvmkz6oIXryGxn83CpdSFWKHOyyl+DSW0=; b=RHL8x2jyruTdimZBrXYyc8tFsWVLNUskPvZ/2TyG12j8U0O8honB2eK5XlUSWy3DUB 56V7C+KeJVvK+NnjfVRQDP5H/oyF/vSea4WXCfg4ZeHoZZN5+M6thbGL3x8rPa7XJYmd VnyfI9pIEqSZu1UQblAC4IbZpCRcbEvE0fLVk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=rfrat4Rlxomvmkz6oIXryGxn83CpdSFWKHOyyl+DSW0=; b=TVh56p9Fr+lK7H7xR9ybZZIAjypF6CyGrO1FX869smLc1rXQWtQuKB4T2XlC8Tpd/n qZ5DVaKk9UR2XOLxzcvnMuc7zRjnTQqvTFSLblDXyYdlpSZgj6kDQe3QpqXBd1uemA7y nHfwH4dUJYMKlNRui78IBjIgdDFra4AcCffOH/icPMi+EoTch3ukYXp9um7WqHKmM0aF TqUG8Wh1GUtK0dEDcI3KK98vERJn1fTOE2QyBUdJhB2uIcJ6s8HCvhntEtcVMI5Ibxky 2jQHvo2OkG0k6NrE1eo+IbS4fFaFTMMPGJiUMbiuB0i9Hh85ai4zYoWrguh3NdGFYbap uYIg== X-Gm-Message-State: AOAM531wlWfbnosmSSGf6OVbso4C5rdwuy9QMkwf04ysVdcYylb2Ogf3 SOByL/cYTnF1O3qZlkbN8GQaki+kBU6+K0Y4btB3WQ== X-Google-Smtp-Source: ABdhPJxmEeItcMU19PiaHUW62CuyHNs94HvPGc0ph6YYpuokfdVqZDbc+txT3vTlvv6z6tsCl5gaEJ6CALk/t1qCsCY= X-Received: by 2002:a1c:6a09:: with SMTP id f9mr447844wmc.104.1613090180863; Thu, 11 Feb 2021 16:36:20 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: Date: Fri, 12 Feb 2021 00:36:10 +0000 Message-ID: To: Kamil Tekiela Cc: PHP internals Content-Type: multipart/alternative; boundary="00000000000038ad4d05bb18d3a4" Subject: Re: [PHP-DEV] [RFC] mysqli bind in execute From: craig@craigfrancis.co.uk (Craig Francis) --00000000000038ad4d05bb18d3a4 Content-Type: text/plain; charset="UTF-8" On Thu, 11 Feb 2021 at 7:43 pm, Kamil Tekiela wrote: > https://wiki.php.net/rfc/mysqli_bind_in_execute > > I'd be happy to hear your comments. Please let this pass. The current approach is absolutely horrible and causes so many developers using mysqli to do things incorrectly (like trying to use escaping, which is so easy to get make mistakes with). Craig On Thu, 11 Feb 2021 at 7:43 pm, Kamil Tekiela wrote: > Hi internals, > > I am proposing the next change to improve mysqli extension. This RFC's goal > is to add a new optional parameter to mysqli_stmt:execute() that will take > an array of parameters. > > The RFC is located at https://wiki.php.net/rfc/mysqli_bind_in_execute > > I'd be happy to hear your comments. > > Kind Regards, > Kamil Tekiela > --00000000000038ad4d05bb18d3a4--