Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:119527 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 50714 invoked from network); 12 Feb 2023 14:46:25 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 12 Feb 2023 14:46:25 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 4F2AD1804BE for ; Sun, 12 Feb 2023 06:46:24 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS16276 149.56.0.0/16 X-Spam-Virus: No X-Envelope-From: Received: from tls2.org (tls2.org [149.56.142.28]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Sun, 12 Feb 2023 06:46:23 -0800 (PST) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: thruska@cubiclesoft.com) with ESMTPSA id 87C913EA20 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cubiclesoft.com; s=default; t=1676213182; bh=umeKWSyqfgeJP+eSqNY4BZ5NPhCh1hqdvMMlPl/RJpw=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=F7p9ax9x8/kNmRUeduE66/QI3nlOVx65DabQ/tMTnXOXXy22SQ5r1wcXW/GwNZHO5 4++yrjOS+ZdFF1blVS4Z3LFglhym0JorWLgdo6fvE8FjLJgtKj8z6iRwuTnEtOwY21 d62ytT9lwf5N/9MkRR+HrKj05nI90PO6wKUjvc+K0GM7KaVOYB1MKpCo4DywiUd6BV KRTafOfCutJnZtpu+5Bjy5/+3Aq2mJXeGOgcRqdh2WhKbFaCNI+tEkU7pgLPbmXmYa 9llKoc4V6AlAKd5kPtaEjMPOgl43d5/1ta4F/mN2R7+UX7bApMsqEVgWoT388T/R8h 0Y8XCAaPI4niQ== Message-ID: Date: Sun, 12 Feb 2023 07:46:20 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux i686; rv:11.0) Gecko/20120327 Thunderbird/11.0.1 Content-Language: en-US To: Hans Henrik Bergan , Niels Dossche Cc: PHP internals References: <518e7f86-c4b6-c4f5-8e99-8a51ce049738@gmail.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] RFC karma request From: thruska@cubiclesoft.com (Thomas Hruska) On 2/12/2023 5:47 AM, Hans Henrik Bergan wrote: > Fwiw I would also find an $offset argument useful. fpassthru's lack of both > $length and $offset made my life harder when implementing "HTTP 206 Partial > Content" / "HTTP range requests", I was going to suggest this myself until I realized that an $offset parameter would be rather problematic. What happens if the offset is negative? Does a negative offset mean seek backwards from the current position OR start at that many bytes from the end of the stream? Is the offset a seek operation or a read operation? Not all streams are seekable and reading is generally a fairly slow, blocking I/O operation. Also, not all stream lengths are known. A negative offset in non-seekable scenarios would almost certainly have to throw an error. fseek()/fread() are more flexible and consistent for getting to the desired starting point in a source stream. A negative $length would also present some issues. Again, not all stream lengths are known. Correctly handling negative values would require managing an internally, temporarily allocated buffer of sufficient size to be able to backtrack streams of unknown length. And might even have to cache the entire stream in RAM, which would be problematic for 1GB+ streams. Or just throw an error for such streams. Or just restrict $length to non-negative values only. In short, a non-negative, nullable $length parameter is the only well-defined operation for fpassthru(). fpassthru() is largely a convenience wrapper around fread()/unbuffered echo in a loop with some extra output buffer management and is subject to PHP max_execution_time. For large files and/or slow/high latency networks, PHP can timeout before delivering all content. There are several web server extensions available (X-Sendfile and X-Accel-Redirect) where, for local files, the rest of the request can be handed off from PHP to the web server to completely avoid writing any file output to the output buffer and also avoid timeout issues. The existence of modern web server extensions for all major web servers limits the overall usefulness of fpassthru(). IMO, $length should be added for language-level completeness/convenience but it might also be a good idea to mention X-Sendfile/X-Accel-Redirect in the documentation for fpassthru() so that users are encouraged to leverage resource-efficient technologies wherever possible. > Ended up with a > $output = fopen('php://output', 'wb'); + stream_copy_to_stream() > hack because of fpassthru's shortcomings (Thanks to cmb for that hack, by > the way) > > > On Sat, Feb 11, 2023, 15:26 Niels Dossche wrote: > >> Dear internals >> >> I would like to gain RFC karma for creating and proposing an RFC: >> "Implement GH-9673: $length argument for fpassthru". >> Account name: nielsdos >> >> Thanks in advance >> Kind regards >> Niels -- Thomas Hruska CubicleSoft President CubicleSoft has over 80 original open source projects and counting. Plus a couple of commercial/retail products. What software are you looking to build?