Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:119864 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 41866 invoked from network); 10 Apr 2023 16:02:42 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 10 Apr 2023 16:02:42 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 1D4D2180539 for ; Mon, 10 Apr 2023 09:02:42 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-0.2 required=5.0 tests=BAYES_05,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,FREEMAIL_REPLYTO_END_DIGIT,HTML_MESSAGE, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS15169 209.85.128.0/17 X-Spam-Virus: No X-Envelope-From: Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Mon, 10 Apr 2023 09:02:38 -0700 (PDT) Received: by mail-pj1-f51.google.com with SMTP id 90-20020a17090a0fe300b0023b4bcf0727so4887735pjz.0 for ; Mon, 10 Apr 2023 09:02:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1681142557; x=1683734557; h=cc:to:subject:message-id:date:from:reply-to:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=WzKxTzMs6p5F2HZ6wQhgFQ+svbuZvSULx8zQKyNyi5w=; b=d/FaGIaFtjZ2Lxrof3SueipL7xwEChXsz6sQ9KSQAyUVCng5Z7iXbrbvBTX0MUgnoi Rc5knaYVPHBp6Xcyl43ewKJiMSz7xuCI4pHmdLHI9IGbt+qySyz/zubmQDyT0Dt/jB9o w8n+4ZguNWBnNf0xEu4PJxudh3r/DUzpBskSzCyTS84ouxrhZ1ziZvbK05RqjhTMBCHr qALH1JF9qCCu5arK0PFFmsxhRC3TjLkbY1se8/zmG2TT8bBzbqaqLeumJg/Lfmp3f0uE 3T7eBdTtMTV30phK7o0fZ+Z/wxmh6liaRgHglOJbZXCMA00ZuYwaNZIJOyarasC1tNKD q5Nw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1681142557; x=1683734557; h=cc:to:subject:message-id:date:from:reply-to:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=WzKxTzMs6p5F2HZ6wQhgFQ+svbuZvSULx8zQKyNyi5w=; b=MGH0yipPBmPQsQ6UMlNbTZgl/dBg1F2rSAGEUpMHEpDM08OOaXc0yQME08dSyoIiVD csbNZ0HbqFsxB2ncnLl14yhIfenkJRGtN2aLExJq3KAqMq3NNWWUX4rTEGe6zfS/OmZ0 5XXQ1ErETn1TZ3gfAA1NIc8RfhVoQJhwkZiIVDXLjiuc0LF0exZcRTCqSHZ5O4hNtVGl sA35PPW4PiKDl8ya6rT59/m3Cn8UXd1FtTQR/Gy/w84un/KIX8irBEEOVTnCuTTpRF4Q IIUnHNl37dNkjz6ssUg5DzyjoW2Z4DEipreA3hgS0ycjy5mkncEthEqLQmdbdG1rft0S 3hDQ== X-Gm-Message-State: AAQBX9cSWbFg3HOSU9LXmXEPMaSOiIpTsCN+HzDWs1lkVJxMlwlKYVsM kidM7ZZUHRIwPEz4Cnjv1FdrqfPiiGqDzg2Smlxj8v6EbYM= X-Google-Smtp-Source: AKy350YU688ZnoJtJtji4rspzot/bIeSJDxlXa36HsH5Vzcy9Sb5hAbIzwGPq9IQcxy/FYN04CU+n6jktgaou57mbeY= X-Received: by 2002:a17:902:778c:b0:1a1:ea19:8f5c with SMTP id o12-20020a170902778c00b001a1ea198f5cmr3544659pll.5.1681142557188; Mon, 10 Apr 2023 09:02:37 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: Reply-To: autaut03@gmail.com Date: Mon, 10 Apr 2023 19:02:24 +0300 Message-ID: To: Craig Francis Cc: PHP internals Content-Type: multipart/alternative; boundary="000000000000f0252a05f8fd806a" Subject: Re: [PHP-DEV] Future stability of PHP? From: autaut03@gmail.com (Alex Wells) --000000000000f0252a05f8fd806a Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Mon, Apr 10, 2023 at 3:59=E2=80=AFPM Craig Francis wrote: > One team of developers I know are still finding these issues well over a > year later (they also introduce new code that trips it as well); two othe= r > teams specifically ignore this deprecation (far too many instances to > "fix"), and one team is still to decide what they are going to do > (annoyingly they are still using 7.4). How can they be finding those issues over a year later? Do they have pieces of completely untested code that has never been called in more than a year? If so, they have bigger problems than PHP deprecations. Otherwise, they should see the deprecation logs either on production or on CI. I highly doubt they're not collecting any logs from production, so they had more than a year to collect all the places where a deprecation is triggered and fix them. Speaking of those that ignore them, well, I'm not sure what the expectation is. Do they think the deprecation will simply go away on itself? Or do they expect the already small PHP team to infinitely support their code, sacrificing other developers' experience? Also, can you name an actively developed software product that introduced no breaking changes in the span of the expected 10 years? Besides, as mentioned before, it's likely that such projects are also using at least some other 3rd party PHP dependencies, and those usually have a shorter BC lifespan than PHP and require more efforts to keep them up-to-date. Again, is the expectation here to infinitely keep the backwards-compatibility? If so, why is it that almost every dependency follows Semver specifically to manage breaking changes, and there are practically no examples of actually avoiding breaking changes in the long term? --000000000000f0252a05f8fd806a--