Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:117486 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 20471 invoked from network); 6 Apr 2022 15:08:00 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 6 Apr 2022 15:08:00 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 2BBCF180539 for ; Wed, 6 Apr 2022 09:38:17 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HTML_MESSAGE,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS15169 209.85.128.0/17 X-Spam-Virus: No X-Envelope-From: Received: from mail-lj1-f172.google.com (mail-lj1-f172.google.com [209.85.208.172]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 6 Apr 2022 09:38:16 -0700 (PDT) Received: by mail-lj1-f172.google.com with SMTP id h11so4014687ljb.2 for ; Wed, 06 Apr 2022 09:38:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=craigfrancis.co.uk; s=default; h=mime-version:from:date:message-id:subject:to; bh=ddjSyjgXYSzSlMSSrEoWmq3FlLBw1jlG3eVtdZecPWE=; b=KKh6ylGtDFMEJzJsL0AUiPqFz6Tkoz/RifmfO6FaS3tp8sOKq1VjJx48WZiBX5ekZ4 UQWm58cGtbgAbTRcuwGd4L/GE7wb03dCdENzVMs5qEhutVmSuO0sQef6lhzNGeAXQeJF fuHbeIyG+HQnA3OLMweAcznOCfvipceA+EiUY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=ddjSyjgXYSzSlMSSrEoWmq3FlLBw1jlG3eVtdZecPWE=; b=E23XK6DJuhiIfwEBIcc5jI8eKJwn9opVq28pAwpbxzwAkjbDm67Ko3cUcIEdTzHV6O VbBk5itqPdAjOLG1LMh6gokLz1u4tqjWkzwJBjZxZDS8BajJ36lX/7JTEh5GTCcE9VHM nzM+mV3fiMH9R+MAXDaxbLjWfd6EQwuDUnxAT3n5fpryazTV8jz4g1wKn5nW3xF/Iebz pAG37pjOreu6iGz/gKNDpzHkrXNiZwqWK2IGDzo5kWORZZl0Z+cKmYjBTDvyfrfv+iog lax5016PYkmK5TQild9lsrmSXJQiw0S8W+wPdIlFtLHQ2+tqi5ibJfAupfkCMmeXPyhl gvBw== X-Gm-Message-State: AOAM530ydoN/Rb2GBmMTZCDTMWrcZCkv0DmCLwy+U/wcEhsrD2mEWvYq pJHfoAsUGAJHtNXWwjxGki207erkr4i00xtToDOEWb0XQSMRbw== X-Google-Smtp-Source: ABdhPJxCNSM54x5oyix3CZORS62f4LDNUZ84IDEh5UA7IV466HYFmvR++N8qKpvm8sVnx6cLNqtuw56fH7aNOBSchDw= X-Received: by 2002:a2e:81c1:0:b0:24b:f44:3970 with SMTP id s1-20020a2e81c1000000b0024b0f443970mr5894119ljg.97.1649263094988; Wed, 06 Apr 2022 09:38:14 -0700 (PDT) MIME-Version: 1.0 Date: Wed, 6 Apr 2022 17:38:03 +0100 Message-ID: To: PHP internals Content-Type: multipart/alternative; boundary="000000000000eb107e05dbfefc68" Subject: MySQLi Execute Query RFC From: craig@craigfrancis.co.uk (Craig Francis) --000000000000eb107e05dbfefc68 Content-Type: text/plain; charset="UTF-8" Hi, Kamil has been working on a proof of concept for a `mysqli_execute_query($sql, $params)` function, and I've written up a draft RFC for it: https://wiki.php.net/rfc/mysqli_execute_query It's continuing the work Kamil has done with the "mysqli bind in execute" RFC [1], to make parameterised MySQLi queries even easier, by creating a single function that takes the SQL and Parameters and returns mysqli_result|false. While this can be implemented in userland, the focus is on trying to make parameterised queries as easy as possible, so developers are less less likely to use risky escaping. Craig [1] https://wiki.php.net/rfc/mysqli_bind_in_execute --000000000000eb107e05dbfefc68--