Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:113583 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 24918 invoked from network); 17 Mar 2021 03:08:10 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 17 Mar 2021 03:08:10 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id D154B1804D1 for ; Tue, 16 Mar 2021 20:02:04 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HTML_MESSAGE, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-Virus: No X-Envelope-From: Received: from mail-lf1-f52.google.com (mail-lf1-f52.google.com [209.85.167.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Tue, 16 Mar 2021 20:02:04 -0700 (PDT) Received: by mail-lf1-f52.google.com with SMTP id 18so735833lff.6 for ; Tue, 16 Mar 2021 20:02:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8sKPVtonFqRk0neTM1TZYdHzzqeJmqFgAnLibvjSpJg=; b=hz8ZG9tFoKia6CiOaIFSsXfK2LWNRwRL+8fQXiEwrAQ1+IcbUgQ3oXjrZmlKQoWFpQ cEl/Mop/hpciHjEfTMQ1yh178HDJ0SXbZuMId0NTTtjWJxZ34LWO7Ix7qnr8IhMdxO16 wdPwciUUcvQF49ix0NOYrLXpfK8gyBE0BVxF99H79HUTHpzxg9DLSPEtU6mSxE26MXm+ RzakWTBnLU/6gXfuDGgA76vBv/aS684vg/+qtv3XKBojnvmOvBAq7y4uxFRC1S/EyDR9 1H5Sf0cz3QI/EcJt8RqdCFjY04+Mnrzpx6weQnKhIhoy4wFKLKsWAhWQ8DQgCDiFviWf 2ZBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8sKPVtonFqRk0neTM1TZYdHzzqeJmqFgAnLibvjSpJg=; b=UV9fHJW/L51VMXvXBgE48VBVTiY0JjH2R6HMPdKz1FLqO8NflmIfl+4Iul8gtVoBsy hNimHzyg68NtoVjdcMRdeL0SHicyHy1IQrgchBD8MipbQv7/8HndPVw0qmTBYRovcUj7 N+WbdKWamVeyxudi2sLD+u/A/6VA7YfLTbV1zNaEnc32BApPsATcRD4wgjIa4DYhBSW0 p62LXfvdzY+ZReff7BYlcvb5KPl3mwfaTUsa5Z6umJRGOATKGGuk3R4HuztayixaLS9Q yDqlTwCTzROSTC6dCJiSmBAeC5VPQqDxIAina+SifGNs4XeT7+I0H1jU2OuVG7AmA/t7 JICA== X-Gm-Message-State: AOAM531UXhKV6a++TaMY77KBVKqCmoLA/TX5oRu7A8f7Gfi7JFwQHhEI jstZGoj61BW/sU037UE3OFM1W1PwSIA6nBG3a1k= X-Google-Smtp-Source: ABdhPJz5Al5LK0XOg1qbZj456lR6R3s5wR+IHzzl3KqFF/moruvgO61XpXnbeAoyKvOFFXheD65dNPlLdTC2m54NuE8= X-Received: by 2002:a19:6b13:: with SMTP id d19mr982606lfa.291.1615950121162; Tue, 16 Mar 2021 20:02:01 -0700 (PDT) MIME-Version: 1.0 References: <70951423-5e77-c150-6dce-dd3c62f8dc8b@php.net> <0b994a60-7970-605b-1657-d6ee732690e5@gmx.de> <5C73A1DE-E563-4F69-B8C7-6506F81D7345@trowski.com> In-Reply-To: Date: Tue, 16 Mar 2021 20:01:48 -0700 Message-ID: To: Josh Di Fabio Cc: php internals Content-Type: multipart/alternative; boundary="000000000000f25b2905bdb2b4e3" Subject: Re: [PHP-DEV] [VOTE] Fibers From: sarkedev@gmail.com (Peter Stalman) --000000000000f25b2905bdb2b4e3 Content-Type: text/plain; charset="UTF-8" On Tue., Mar. 16, 2021, 13:58 Josh Di Fabio, wrote: > Fibers will not make those issues obvious at all. The issues I'm > describing will only crop up spontaneously and under load. > Hi Josh, Is this really that big of a concern though? The issue will only be a problem if it's run inside an event loop/scheduler that the concerned library is compatible with. In which case the developer should be well aware of what is involved. Otherwise, if the library uses fibers internally it will have to resolve them itself before continuing, no? If `capturePayment()` starts a fiber then execution will not get to `setTransactionId()`, until it completed or is handed of to a scheduler (again, which the developer would be aware of. So I don't think developers will face this race condition, unless they are using framework like amphp and reactphp. But that's already the same now, so if it's an issue it's not a new one with this RFC. Your average unaware developer can continue to happily use any libraries they want without encountering any async issues. The calls from outside the library will still be blocking, as PHP will still be single threaded. Thanks, Peter --000000000000f25b2905bdb2b4e3--