Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:116787 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 18291 invoked from network); 3 Jan 2022 16:28:46 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 3 Jan 2022 16:28:46 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 18DFD18054D for ; Mon, 3 Jan 2022 09:35:46 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS15169 209.85.128.0/17 X-Spam-Virus: No X-Envelope-From: Received: from mail-ua1-f43.google.com (mail-ua1-f43.google.com [209.85.222.43]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Mon, 3 Jan 2022 09:35:45 -0800 (PST) Received: by mail-ua1-f43.google.com with SMTP id v12so47071833uar.7 for ; Mon, 03 Jan 2022 09:35:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dqxtech-net.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=i5e4jTHeg/EqOFhdC/nM99zzXKCaejCdmHxJN9gqro0=; b=xbXrm8mWuk9vMsvqdokxXqZWAhGdGQ7uEH3oEhBszIJ5HE+uzvlqLbixLbPGw8nMwy TQsaoDxKBCoxGHEYoV0XFNWUdE1dCCuNAzaKuVpXCeOUAW6vX9IxmOoYSwF0wfphYKfG O9yUEjTSVLNaDaNYulIjQJHET2Q/y/yuRo03Cc3sNe+jrAnratGT8/WmrocssnT++4HT y9DQmR5ERCYHfgMO+8Pk/WCXP8sgWeUKvx+yG7VxdccbsQoBPxmFR1tj+Jhov/CecIgA W/7jIQLOpokxsWWgzrYH8o6pmmVH//WLgH0Q0Z6GX3bY9ThTADoGcIKQPjFEWuwf/e4R a19A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=i5e4jTHeg/EqOFhdC/nM99zzXKCaejCdmHxJN9gqro0=; b=Nz12RIG+KRROhjnaL8cN/2s63Acrb1pQ4pOBG28/RCXxZAhnMqeY3GqCWgG+ZXlueE LDioDIJNNBm9vNhIbIvrRZI49Gd87UL/y3OUk3unl7UVY3kl2aH3CRkTy2Q427iVebzT q0a5AgYhuWUWq0zV5il+OOBh7i6msQkcbS/8dzk/Ngvz5CRgqj/MjHLBJw7PCXZPjT35 OvaF3WAR65Ul0l+2JVO4rwVzV6BOv1tdmsnArFMTKXwFKdNzrN30NtgMcDaRJK2iwC+Z zxsCKSIvtlLqN+Tqi2dz/dYYjXE5CG36xinT0gNvKGR+IOVM+fkWz1UXzMFxK1Cchhla GEeA== X-Gm-Message-State: AOAM5332UEhB9E3M86Tg511fTfPC4ds9HZQqUCnRwUgmr5xu1qSkWAPx 7WEDcrm3prUf0zcZsU/6NXW+LTfJgvQeMYJ9XMFuaQ== X-Google-Smtp-Source: ABdhPJwugj47VSApl4zOBnvRtVOkhL7TYvYDlVfQ7GMGS4+nNUcJHHF2DRxqU1ELgB8rLmQ4ZdmMGYdguUovR4nRfCI= X-Received: by 2002:a05:6102:736:: with SMTP id u22mr14109039vsg.60.1641231344613; Mon, 03 Jan 2022 09:35:44 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: Date: Mon, 3 Jan 2022 18:35:33 +0100 Message-ID: To: Jordan LeDoux Cc: PHP internals Content-Type: text/plain; charset="UTF-8" Subject: Re: [PHP-DEV] [VOTE] User Defined Operator Overloads From: andreas@dqxtech.net (Andreas Hennings) One question that just occured to me: Why allow the "public" keyword for visibility, if operators are public automatically, and "private" and "protected" are not allowed? Do we plan for private/protected operators in the future? Shouldn't we eliminate meaningless choice? On Mon, 3 Jan 2022 at 01:14, Jordan LeDoux wrote: > > Hello internals, > > I've opened voting on > https://wiki.php.net/rfc/user_defined_operator_overloads. The voting will > close on 2022-01-17. > > To review past discussions on this RFC and the feature in general, please > refer to: > > - https://externals.io/message/116611 | Current RFC discussion > - https://externals.io/message/115764 | Initial RFC discussion > - https://externals.io/message/115648 | Pre-RFC discussion and fact-finding > > Jordan