Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:118463 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 29741 invoked from network); 24 Aug 2022 12:10:54 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 24 Aug 2022 12:10:54 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id B0DAC1804AB for ; Wed, 24 Aug 2022 07:16:09 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FROM,NICE_REPLY_A, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS8560 212.227.0.0/16 X-Spam-Virus: No X-Envelope-From: Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 24 Aug 2022 07:16:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1661350566; bh=cagnY6e/rR283IkmqXIUfq08gxCFNO58nhYb/B8M5+A=; h=X-UI-Sender-Class:Date:Subject:To:References:From:In-Reply-To; b=NP9yJhAUyqkHGCwRd4Fvt49GIU2O1NPtmkqEksqOtL20diLNGtocdvYzyZLdrsnmk rpkcQS0XlKifnW3L/RKwMQ0OVtsFjr9999KP6jfqdFtx7DdL/JjA4GS5w9tDIhIEkA pkf2pwQ5r4R2Hc35QrcbqeC4NthJak58CTiirdX4= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from [192.168.2.130] ([79.220.93.232]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MLiCu-1oiWaE1HfM-00HgbF; Wed, 24 Aug 2022 16:16:06 +0200 Message-ID: Date: Wed, 24 Aug 2022 16:16:05 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Content-Language: de-DE To: Gert de Pagter , PHP internals References: In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:MQt/9HZlbONKlEIu1HdqDCDa8vTlYPJqNMS1/ZVz/xLl/HwvZPp 5IHnxGEM+uyvpVxwbE8MLVrDxpcfvHZ7GmZHyeeyT6N8orrFHhEUks3iV8fKcvi9/M5B9Bn EuoylE3ukBNbGtjjJa2QRQhm+bc82z2Xa3tfoPsdKKBx2hTId+CdU6Khv5UbeMaSvziNWOH ocw6ptA+jv+VERNzkeXrQ== X-UI-Out-Filterresults: notjunk:1;V03:K0:HYD2MvPmJcA=:4sO+l8p3L2hylHoRrkFYSe BkHtmGl7fbJQwILs/svxbOjpV8yfEIjiKD5JVntT68RfqXnWQOOfb6yBS3C43FeodSgmAs6I9 j4bLWk0+OO01CbnPAIgqFOqXoJ4+z5ylk/8qVN7qzqVzayWOjmy78A3PzPPrLXgqzBpwhjqkI MAKuLuZQR/Ce1lvcekffIRVSxxpDIYjbCa/bLpx0w2wumT3Hns1VpCH0YXq6+NqWoWog9ZtDU pFGrpe4XFvmLZ7h57d3ULs5olTf0ok83+dRhf1+epWmIDtXpJyeBi5W46pMgwl7/oh4hbEmg8 Pd1dsAhWPgXRL4/tRy7QnsAYEq/52aEJihs6NpviQG6lq8rJVNs+KTK2DBIJ4zRa38j0ibJiW IuRojaFLYQyCTx1/zfjox3Oznk7aEU/MBxRZebtO2ZkqxlUXZIGgnc7WDhQMVtDqJycfggNu7 Kg8OWfy/4ZgZoBK2DIHvwXS4GqLXmT8TxCJvLJRmHfkDgm+j07e23A3D0s7/WJM1CgVOyGuiz fLfnMvojHj2CinUhr0jYuWDn+wVzmQQMVx05qjnKFAFCQ6qG9Rg6oWnOOTcIKEcqjm4Ijj9nD j7OWNjWw/rKXE0+1YBhq5btwDcpRrw5bLkCT2/EAgxehZKfdEzQT/LNSUTz3AD6Edb3Q2aHot SmGBd0bIFdXd1mF3Sjfd8Llle4BwlwW1D75x2LfD18kdR2/1A3yRcmGkxnoGhzrbXfozZT0o/ P/vpX68Iu/YdR5E/uJk4hnxpGzAWOyvY1Qt6CGgGw1Lxqg6NMVWqnIdRHFwQhdUPdDeR1zi5n yoxQfSakzFzWpok5P184pF1/krjKQEYBQxAz1bTQW515dAipAVq02W/lFl1pnK+ctG2ab1tCe hRgO2sXarAHtFvSbgXAXNhUTVuX56qsp36PkHTz34mtoqp4mRlbboTCJhfBlnJfOiNkeDTP6K TM+0L9jj8WmdO52z21wP7enz45/yWOBUyDg6csWBM4hKvQls86JoYDASmcFrv6jl0n6r9NIoV jM17NlpsgZW1KLu3w+2CJZmq5UdlAFAnuIcSjQS+Z6PdB17tvEDVprqYzn0epbcQ1GSKuP1cf 4eqpT18J2CgovQcsqDdDPa0Xb+jnPOR0OPKkJOtLvzoGoRrqGAhtCDCDQ== Subject: Re: Nullsafe array access can still emit a warning From: cmbecker69@gmx.de ("Christoph M. Becker") On 24.08.2022 at 14:58, Gert de Pagter wrote: > I recently learned that using null safe on an array access can still > emit a warning when the array access is not defined. I kinda expected > it to work like a null coalesce and just short circuit there,without > the warning. > > Is there any chance this behaviour could be changed in a n upcoming > PHP version? I didn't see anything mentioned specifically about this > in the RFC. > > https://3v4l.org/1raa8 That behaves as documented[1]: | The nullsafe operator works the same as property or method access as | above, except that if the object being dereferenced is null then null | will be returned rather than an exception thrown. And particularly: | The effect is similar to wrapping each access in an is_null() check | first, but more compact. However, see e.g. . [1] =2D- Christoph M. Becker