Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:120590 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 46580 invoked from network); 15 Jun 2023 15:06:09 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 15 Jun 2023 15:06:09 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id BC377180539 for ; Thu, 15 Jun 2023 08:06:06 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: * X-Spam-Status: No, score=1.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,HTML_MESSAGE,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_SOFTFAIL, STOX_BOUND_090909_B,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS36483 23.83.216.0/22 X-Spam-Virus: No X-Envelope-From: Received: from weasel.tulip.relay.mailchannels.net (weasel.tulip.relay.mailchannels.net [23.83.218.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Thu, 15 Jun 2023 08:06:04 -0700 (PDT) X-Sender-Id: a2hosting|x-authuser|juliette@adviesenzo.nl Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id EE09E7E0E11 for ; Thu, 15 Jun 2023 15:06:00 +0000 (UTC) Received: from nl1-ss105.a2hosting.com (unknown [127.0.0.6]) (Authenticated sender: a2hosting) by relay.mailchannels.net (Postfix) with ESMTPA id EE3EF7E0712 for ; Thu, 15 Jun 2023 15:05:58 +0000 (UTC) ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1686841559; a=rsa-sha256; cv=none; b=0Qn7jvXnGWIjMw6rhwKHIgpw4Bj3CNu4NzpfBTEds+7vtS4b4TJmazVAVM1Oo574ajvHsz Klq152qmjlugkstWS4a8FTz53tiLgJzP+ph96KHOkNv1dWV8EPJp4UUcHPYZhyY0Ce0ODc gTXbJQAjM5oBQh1ZzlroRdiwoe3JipWTggv/cZaranf7+BG6c5vyG09AdXPCwnB8ImgQP2 t3Ji7D2epvp+Qvo+uNsxnarulBybFacrjG0pSdZWqGW09sCicE9fV2fafU2sImXv+3wlqq ixiZlwNXuh+jqq8nlnHFRQKj/B7BW1eWxL/mCO/fvTrwzEbNTxXYlQxJHusm3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=mailchannels.net; s=arc-2022; t=1686841559; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references:dkim-signature; bh=P0dTMLz94AtdViglizVP3OM1FpEgjIOmbAV/XzLGZzs=; b=1sfAcYCY0fa272lytZXvXKfYoI8cB+fG6Ik2CvC45CqbqXM1UkEA9u42ZsYypvKkCHCjeD XyCoEuyJMf5qarxYOSuq/LjkTkgr1xmtdFo/64tPB7dSj1Qhn4oi7H5mCa/ScBc5EWAolS 8t6zxZj0Vr+Nv0FR7gWstTyDWXVO489OZIKXmvhzn/rA84gIyyYaAmwEtICCBcr+8zzsAa dM6VaS0mkGukezKWT6K1Hd6OweUGPR1cEeQuBYOuQB4b0P9kMgA6WaQAWVEjfVX4nMJEGJ 1KRedEMlam4G/zURqZQPXeMfjkgpjCpAtnVLt+vc8PFFFM0tt8vmPvmUagm0vg== ARC-Authentication-Results: i=1; rspamd-7c78575475-8vmnc; auth=pass smtp.auth=a2hosting smtp.mailfrom=php-internals_nospam@adviesenzo.nl X-Sender-Id: a2hosting|x-authuser|juliette@adviesenzo.nl X-MC-Relay: Neutral X-MailChannels-SenderId: a2hosting|x-authuser|juliette@adviesenzo.nl X-MailChannels-Auth-Id: a2hosting X-Skirt-Gusty: 5f8157d2086a439d_1686841560451_1767901944 X-MC-Loop-Signature: 1686841560451:2305725399 X-MC-Ingress-Time: 1686841560450 Received: from nl1-ss105.a2hosting.com (nl1-ss105.a2hosting.com [85.187.142.69]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384) by 100.125.42.144 (trex/6.9.1); Thu, 15 Jun 2023 15:06:00 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=adviesenzo.nl; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:From:References:To:Subject:Sender:Reply-To:Cc: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=P0dTMLz94AtdViglizVP3OM1FpEgjIOmbAV/XzLGZzs=; b=KXvIlVX74+y+W44txo8NswqExf HEEzMiJUhn4QtcQjTRNIiyYxxLVyqw61V9zA9pJwk6IqY2QQKE7J3sQ+YI8ibMmxVA6t8nkhvwQDd 2XfG0i41VBr8u7IsZhEUOdfmqgunu6N6vXM9exAkVshkkzKllJTx4EVbTHCE9Z6G7JI8=; Received: from [143.178.154.86] (port=51122 helo=[192.168.1.104]) by nl1-ss105.a2hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.96) (envelope-from ) id 1q9oXv-002mg9-1f for internals@lists.php.net; Thu, 15 Jun 2023 17:05:57 +0200 To: internals@lists.php.net References: Message-ID: <648B28D5.1060506@adviesenzo.nl> Date: Thu, 15 Jun 2023 17:05:57 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/alternative; boundary="------------010604000206060104090203" X-AuthUser: juliette@adviesenzo.nl Subject: Re: [PHP-DEV] [RFC] [Discussion] Deprecate functions with overloaded signatures From: php-internals_nospam@adviesenzo.nl (Juliette Reinders Folmer) --------------010604000206060104090203 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit On 27-4-2023 23:28, Máté Kocsis wrote: > Hi Internals, > > As you have possibly already experienced, overloaded signatures cause > various smaller and bigger issues, while the concept is not natively > supported by PHP. That's why I drafted an RFC which intends to phase out > the majority of overloaded function/method signatures and also forbid > the introduction of such functions in the future: > https://wiki.php.net/rfc/deprecate_functions_with_overloaded_signatures > > I'm not sure at all what the best solution would be to get rid of the > overloaded FFI methods, so I hope that someone comes up with a better idea. > Currently, the RFC suggests deprecating and then removing the static > methods in question, but I hope that we can find a more elegant approach. > So this section is incomplete and it's just for starting the discussion. > > Regards, > Máté > The impact analysis on userland code seems to be missing for some of the proposals, most notably for the proposals which I expect will have the highest impact. I'd like to ask for an impact analysis to be added to each of these: * array_keys() * ReflectionProperty::setValue() For the `get*_class()` deprecation, I wonder if an additional impact analysis is needed for packages which may not have removed usages of `get_class( null )`, which would now be double-impacted (and not caught by the current analysis). Smile, Juliette --------------010604000206060104090203--