Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:119325 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 86377 invoked from network); 18 Jan 2023 17:51:08 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 18 Jan 2023 17:51:08 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 0050F18054C for ; Wed, 18 Jan 2023 09:51:06 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: * X-Spam-Status: No, score=1.1 required=5.0 tests=BAYES_00,HTML_MESSAGE, SPF_HELO_NONE,SPF_SOFTFAIL,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS24971 77.93.192.0/19 X-Spam-Virus: No X-Envelope-From: Received: from mail-mahalux.mvorisek.com (mail-mahalux.mvorisek.com [77.93.195.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 18 Jan 2023 09:51:04 -0800 (PST) Received: from cfb1489e1634 (10.228.0.165) by mail-mahalux.mvorisek.com (10.228.0.4) with Microsoft SMTP Server (TLS); Wed, 18 Jan 2023 18:50:58 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=_368d8e1ecec4d8608df8606fe62fc405" Date: Wed, 18 Jan 2023 18:50:57 +0100 To: =?UTF-8?Q?Rafael_Fern=C3=A1ndez_L=C3=B3pez?= Cc: internals@lists.php.net In-Reply-To: <184B26FD-DD6F-4047-9FC6-747515F1BDAA@vmware.com> References: <184B26FD-DD6F-4047-9FC6-747515F1BDAA@vmware.com> Message-ID: <5eda1df623dd1008efbe1bbca9278273a8423f2f5a66185a5c782abf31636cd8@mahalux.com> X-Mailer: SAP NetWeaver 7.03 Subject: Re: [PHP-DEV] [Update] PHP build for the wasm32-wasi target From: vorismi3@fjfi.cvut.cz (=?UTF-8?Q?Michael_Vo=C5=99=C3=AD=C5=A1ek_-_=C4=8CVUT_FJFI?=) --=_368d8e1ecec4d8608df8606fe62fc405 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8; format=flowed Hi Rafael, you have my support to add WASM/WASI arch support natively. Our usecase is to evaluate some php code in client/browser directly and thus improve client response times. Based on the php-src contributing policy, minor version branches (PHP-8.2, ...) are bugfix branches only, thus you should target master. Your PR should add 1 workflow which will run all tests on WASM with opcache disabled and enabled. With kind regards / Mit freundlichen Grüßen / S přátelským pozdravem, Michael Voříšek On 18 Jan 2023 17:37, Rafael Fernández López wrote: > Hello all, > > I'm following up to give you a quick update on the PHP port to the wasm32-wasi platform. > > We have released the port of 8.1.11 [1 [1]] and 8.2.0 [2 [2]] PHP versions. > > We also had a really nice contribution from Simon Menke that we will be merging soon that enables setjmp/longjmp emulation, that will help supporting shutdown functions. We also have work in progress to support PHP fibers using this emulation. > > You can find each patch for the specific PHP version at our project in GitHub [3 [3]]. > > What would be the next steps to contribute these patches upstream? We are very interested in bringing to PHP the benefits WebAssembly provides around application security and delivery, similarly to how Python [4 [4]] and Ruby [5 [5]] are doing. > > Thank you, > Rafael Fernández López. > > [1] https://github.com/vmware-labs/webassembly-language-runtimes/releases/tag/php%2F8.1.11%2B20230111-d5e8a4a > [2] https://github.com/vmware-labs/webassembly-language-runtimes/releases/tag/php%2F8.2.0%2B20230111-d5e8a4a > [3] https://github.com/vmware-labs/webassembly-language-runtimes/tree/main/php > [4] https://bugs.python.org/issue46315 > [5] https://www.ruby-lang.org/en/news/2022/04/03/ruby-3-2-0-preview1-released/ Links: ------ [1] https://github.com/vmware-labs/webassembly-language-runtimes/releases/tag/php%2F8.1.11%2B20230111-d5e8a4a [2] https://github.com/vmware-labs/webassembly-language-runtimes/releases/tag/php%2F8.2.0%2B20230111-d5e8a4a [3] https://github.com/vmware-labs/webassembly-language-runtimes/tree/main/php [4] https://bugs.python.org/issue46315 [5] https://www.ruby-lang.org/en/news/2022/04/03/ruby-3-2-0-preview1-released/ --=_368d8e1ecec4d8608df8606fe62fc405--