Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:120627 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 7038 invoked from network); 19 Jun 2023 21:16:13 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 19 Jun 2023 21:16:13 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 1A4E6180548 for ; Mon, 19 Jun 2023 14:16:13 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS15169 209.85.128.0/17 X-Spam-Virus: No X-Envelope-From: Received: from mail-oo1-f46.google.com (mail-oo1-f46.google.com [209.85.161.46]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Mon, 19 Jun 2023 14:16:12 -0700 (PDT) Received: by mail-oo1-f46.google.com with SMTP id 006d021491bc7-55e34b2bb03so1557504eaf.0 for ; Mon, 19 Jun 2023 14:16:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1687209372; x=1689801372; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=iNvcoSodoXY6+mRLsreMHXeYDcZsgk0czvnmvD53ocI=; b=jA8Q9LrXLp10LcL6/flXnN2FW0f0EhBzNwiZ7evpwICnnHALa71L0stxfpdcqCnTSX Wzxbl0H0vcsclXJrVHUlbk8nsiSVAmerQsXxPS50nUkRdw2BFpmJUovEjb5KCDzWsH7j MPGic09dPMBbZ1M6LAudpzivL7LFadWFsK8L/VcyyYPAuPZvbp2stUzHtbruuQKVqTyF 3ui/NKT/t09SxQACywI7C3hBa9pi48QZhi9hvNtbNVvgS5JCqPiVh6Xao1RMj1G/0SV7 i6GV8lo7edB6LFJPfNGzXyliJEWcnNqKpDDiHRwh+pLntI/+pRUOdUoGsV/eMhY8vcEk YSFw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687209372; x=1689801372; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=iNvcoSodoXY6+mRLsreMHXeYDcZsgk0czvnmvD53ocI=; b=YsV3bh6PEJfhb8O05zc20OMAj0bVZAlcuhEUJzz/OUtoCuUa065Wpx7cw4Vye6IvBz DCqTnxdrA1Ak90L4tuips63VKerIGh9/Kyo+3NKHkEgNN3i3wCGQAA/PdyZblCp3ICBB sBGEjONj25IiJKy9HjbB2xOiAIVmWZdw0T6CjadESIwEZgHV/bVeCtH21knr+Gnuh7jG VEjgpUym/4t9Q1ARsg8PdcVM7PzbkhO4xsiuJv7OAxTrvLbIJdu+ZR0dKG7mdqYEqPob CQNjusiIMYg2KxywzrNXy4iTNgqmnwwh0z4GzSqdjI5smLLnuzAPpCEMAPrLYWp8udDR 55gA== X-Gm-Message-State: AC+VfDyA85i9LUNAGoKAV6jSGLXpZHZW8+YUF00DSSyBX8uHoAe9GHZw W5WvY3TUT77zmahfra5l6YGU+2UtiMVeYZ/4I7uSghAVYGOkSw== X-Google-Smtp-Source: ACHHUZ51oNVHsSFI/SC2JFZ1Ugya/qnTvSytSqQmPojJyFkWXyTWEwmj7PNDZOXrG+i61aMvsmJPBBWSQdYkZLq9lFU= X-Received: by 2002:a4a:da09:0:b0:555:722e:3ce with SMTP id e9-20020a4ada09000000b00555722e03cemr5997820oou.9.1687209371971; Mon, 19 Jun 2023 14:16:11 -0700 (PDT) MIME-Version: 1.0 References: <648B28D5.1060506@adviesenzo.nl> In-Reply-To: <648B28D5.1060506@adviesenzo.nl> Date: Mon, 19 Jun 2023 23:16:00 +0200 Message-ID: To: Juliette Reinders Folmer Cc: internals@lists.php.net Content-Type: multipart/alternative; boundary="00000000000047353105fe820b07" Subject: Re: [PHP-DEV] [RFC] [Discussion] Deprecate functions with overloaded signatures From: kocsismate90@gmail.com (=?UTF-8?B?TcOhdMOpIEtvY3Npcw==?=) --00000000000047353105fe820b07 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi, The impact analysis on userland code seems to be missing for some of the > proposals, most notably for the proposals which I expect will have the > highest impact. I'd like to ask for an impact analysis to be added to > each of these: > * array_keys() > * ReflectionProperty::setValue() > These are intentionally left out due to different reasons: * Even though the 1 parameter version of array_keys() is used a lot, its 2+ parameter signature is much less known. Personally, I've never used it. Of course, this doesn't mean no one uses it, but I don't think this deprecation will really matter in practice, so I didn't care to write a script for this (the rest of the deprecations were easy to analyze via regexes). * ReflectionProperty::setValue() would be a lot of work to analyze since it's very difficult to track whether the setValue() method is called on a ReflectionProperty instance. Not to mention the fact that the deprecation only affects function invocations where either a single parameter is provided or static properties where the first parameter is not null or an object instance. Since the suggested alternative is basically available since forever, I think it's OK not to do an exhaustive analysis in this case. > For the `get*_class()` deprecation, I wonder if an additional impact > analysis is needed for packages which may not have removed usages of > `get_class( null )`, which would now be double-impacted (and not caught > by the current analysis). > I'm not sure I can follow you, but get_class(null) is a TypeError since 8.0 (and have been warning since 7.2). If a package didn't feel the need to migrate its get_class() usages then it is likely a dead project. And if someone tries to upgrade their (proprietary) code from PHP 7.1 to PHP 8.3 directly then they will notice the exception first and also - if they followed the upgrading notes carelly - will learn the relevant suggestions regarding the deprecation. But realistically speaking, these projects will most probably be bound by lots of other more severe issues, so I don't think the above is a viable upgrade path... Regards, M=C3=A1t=C3=A9 --00000000000047353105fe820b07--