Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:120228 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 66576 invoked from network); 10 May 2023 21:28:30 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 10 May 2023 21:28:30 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 311E9180503 for ; Wed, 10 May 2023 14:28:29 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=BAYES_20,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS15169 209.85.128.0/17 X-Spam-Virus: No X-Envelope-From: Received: from mail-oo1-f53.google.com (mail-oo1-f53.google.com [209.85.161.53]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 10 May 2023 14:28:28 -0700 (PDT) Received: by mail-oo1-f53.google.com with SMTP id 006d021491bc7-54f8b7a4feeso1370797eaf.2 for ; Wed, 10 May 2023 14:28:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1683754108; x=1686346108; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=F0kxiviESWqouaFF4STkPXqDCGnDIp/Z/vpXCl3xo38=; b=cXh6Ca/XTzwPTZTCaTupzii7vjaUoVsXa7lNMvxh2JKMQB1J3RK4S+LlfPu1/kplQV HCDZduKyHRYatKkgOl/G2aDmNDh4SEgJlHYoQSQASp6w5zyla4AiC0tveNRzgutTBFIt lUw4J7zYfxy8fUlL5QwOEFOeDsgcjHDI7npNqe1qOaQx2VaCXpSRV6ta+vX0oIo5MSC7 QxDKDm171KumP2KCcnf0V7Vz3atVv4hYWbyrf6LnvaCNb8XyRnJUVygHr848WtPZFsWN 3mkdTm7uI6zWxSggo5qhYXN9D0e3twrRC0i2VGzrRhmdg1eR51+5r+asEfuxjvCB/GmU 292w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683754108; x=1686346108; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=F0kxiviESWqouaFF4STkPXqDCGnDIp/Z/vpXCl3xo38=; b=Smn3Hp80M3r+mWcvpA1gW02IENbV9gOEAB2J9EvKtZOGczBFaOSGKbsTUJRMjXt/cI Ib2VAHHo30+o1tu1vZ5oLS/HYwTnOq1VAOqhA9YmTb3ETyUkayFCiUZBpv2TRlUhZk4L kRyLW893EhawnjrMQC3ArKtb7nOnDFNo4v6P4ZdriKa1vKaZ1xM1/cHbbN01eBGhU3Jm ETmsdHk6GCn8xr/yV7E4Ys6qnM/AuyDCl90tVeDsbirKqeiL9eRUh+cnild+tm+R2Pl3 GaOYAQNgXB9xATx8QqRRy1yhv07kQpIKt896Xk1TA/jpbk+5eJK3VeGmXITfGIX/Cdq/ PQqQ== X-Gm-Message-State: AC+VfDxeSylwP6dUK6lu5cnBbQdlWrJyklj1Xj/RbGws0+Gq0e+IOxOz yRZCdR8qe4//mCbYNzCDy/utzkSAiTAHrfyg9p4IIo9/m7K/KE6b X-Google-Smtp-Source: ACHHUZ4T6m2kWnjuZEljWZrxIahko0G9Nt0OiaqVZm/RFlOaMSPieoTdZaEF5Al42+XnsXttGN3GQGQVo55eXQ0T8fg= X-Received: by 2002:a05:6808:3d7:b0:392:116a:cce7 with SMTP id o23-20020a05680803d700b00392116acce7mr3395029oie.33.1683754107860; Wed, 10 May 2023 14:28:27 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: Date: Wed, 10 May 2023 23:28:16 +0200 Message-ID: To: Rowan Tommins Cc: internals@lists.php.net Content-Type: multipart/alternative; boundary="0000000000007cfcb005fb5d8d24" Subject: Re: [PHP-DEV] [RFC] [Discussion] Deprecate functions with overloaded signatures From: kocsismate90@gmail.com (=?UTF-8?B?TcOhdMOpIEtvY3Npcw==?=) --0000000000007cfcb005fb5d8d24 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Rowan, > As an aside, I don't think "other deprecations are already more difficult= " > is a good argument - it's like saying "yes, I punched him, but not as har= d > as someone else already had". I think the change can be defended from oth= er > angles, but wanted to call that out. > I admit that my argument was not a good one, but I intended to mean that most of the suggested alternatives are not too difficult to implement: since numerous other proposals were accepted in the past with a much more difficult upgrade path, I think this aspect of my RFC shouldn't be a deal breaker considering the benefits. Maybe because the function names are so similar? In general, I hate > variable and function names that differ only by an "s", it's far too easy > to misread or mistype them. Maybe "session_set_save_handler_functions"? To be honest, I'm not a fan of using the longer names (session_set_save_handler_functions and stream_context_set_option_array), especially the latter one looks weird to me, and it doesn't go well with stream_context_get_options(). Besides, a most interesting development is that I've just discovered the stream_context_get_params() and stream_context_set_params() functions which do nearly the same what the stream_context_*et_option functions do: the only difference between them is that the latter functions wrap the options inside the "options" key and also has an additional "notification" key. It *is* strictly related, though: the current function has two purposes: > get an option, and set an option; the RFC proposes to split that into two > functions, and there are three ways we can do that: Thanks for the idea, your explanation made sense to me, so finally, I removed assert_options() from my proposal and the deprecation of assert_options() relies on the PHP 8.3 deprecations RFC. Regards: M=C3=A1t=C3=A9 --0000000000007cfcb005fb5d8d24--