Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:124094 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id D30DB1A009C for ; Sun, 30 Jun 2024 13:54:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1719755750; bh=aVxGpv8/uym0Y3Bo0MjixVDrTtRYF9e2IrfneRqkzHs=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=BRXCKU6EkFNFbm3eb48TrgqwxEhgv4GZFr1W/3jqSWCiOleMfAu9rXlAwyk/BLTsq 5tloHaDtK/dmHeFyiqaaS3jvYURZQK0LJfu0qDOqbVjmblBOtbY4XBZgQvYbr5Oe4s rQw5UkuLhyqyIEJMMkfnfjzM5YluAVwd2yS6GUDf4ItW0ZH2t7sdfjz98KPudJcQ0S qdboS4UrShRtFJ+2IIRAWciXzlAerz25AAl7q6vxQXlSx/Econy5tncYOOSecKfCbR bt9BuCGVzKbjB6D2/WZ3kNzXFMefPas7GpqQbxJYt25QVUYgTNU1YyiBW0Q7IMAff4 z+HQAFPKg5dGg== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 9702C180A4A for ; Sun, 30 Jun 2024 13:55:49 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: Error (Cannot connect to unix socket '/var/run/clamav/clamd.ctl': connect: Connection refused) X-Envelope-From: Received: from chrono.xqk7.com (chrono.xqk7.com [176.9.45.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Sun, 30 Jun 2024 13:55:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bastelstu.be; s=mail20171119; t=1719755667; bh=FWFrbnR7GNedwzJ3mE5kpnul2U8tQW2yx428VijDLis=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type:from:to:cc:subject:message-id; b=erf5WDdVbXShXgLRd5DbaAOjsIi9+sd3JFb8pvC4t1D1e0WDrozRIbPJ8U9O1bBh0 OTkL5lHbyaN3H2/+fb1g9p4fEqW4f4/gPitq5qfueYb61ZaGqY6mj6gGaM7HOuKTfz rSy2h2pMpHiCjuO+WrxIkdEyhb8dc9MKGz0lTAcFvYTKloikC7BslfpRwIEbpwn3qG WCaXg4k5watJQCh9pON5Ks8q2cE36HtFrFsmLdqH0iOB6TrW37JfOpsQ1RBxHAxfdU FFAo00QKtH1FxQjquk6kVq9lq21CtaXrcks0riRm+EDT4XdS8FTLifFobAO+VHWyNC KnCjlQoSVXnHQ== Message-ID: Date: Sun, 30 Jun 2024 15:54:26 +0200 Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net MIME-Version: 1.0 Subject: Re: [PHP-DEV] [RFC] Lazy Objects To: Arnaud Le Blanc , Marco Pivetta Cc: Nicolas Grekas , PHP Internals List References: Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit From: tim@bastelstu.be (=?UTF-8?Q?Tim_D=C3=BCsterhus?=) Hi On 6/27/24 16:27, Arnaud Le Blanc wrote: >> * flags should be a `list` instead. A bitmask for >> a new API feels unsafe and anachronistic, given the tiny performance hit. >> > > Unfortunately this leads to a 30% slowdown in newLazyGhost() when switching > to an array of enums, in a micro benchmark. I'm not sure how this would > impact a real application, but given this is a performance critical I'm curious, how did the implementation look like? Is there a proof of concept commit or patch available somewhere? As the author of the first internal enum (Random\IntervalBoundary) I had the pleasure of finding out that there was no trivial way to efficiently match the various enum cases. See the PR review here: https://github.com/php/php-src/pull/9679#discussion_r1045943444 I was able to find a hacky work-around, but if we add additional enums, perhaps we should add the proper infrastructure to the arginfo files or so to match enum cases to switch-case in C, even without making them an integer-backed enum. >> * what happens if `ReflectionClass#reset*()` methods are used on a >> different class instance? >> * considered? >> > > The object must be an instance of the class represented by ReflectionClass > (including of a sub-class) I believe the sub-class part is not spelled out in the RFC text. I'm also not sure if allowing sub-classes here is sound, given the reasoning of my previous emails. >> * what about the object that a lazy proxy forwards state access to? Is >> it cloned too? >> > > Cloning an initialized proxy is the same as cloning the real instance (this > clones the real instance and returns it). See my previous email. >> >>> After initialization, property accesses on the proxy are forwarded to >> the actual instance. >>> Observing properties of the proxy has the same result as observing >> properties of the actual instance. >> >> * This is some sort of "quantum locking" of both objects? >> * How hard is it to break this linkage? >> * Can properties be `unset()`, for example? >> * what happens to dynamic properties? >> * I don't use them myself, and I discourage their usage, but it >> would be OK to just document the expected behavior >> > > The linkage can not be broken. unset() and dynamic properties are not > special, in that these are just property accesses. All property accesses on > the proxy are forwarded to the real instance. The dynamic property bit is good, I had the same question. To rephrase: Any access to a non-existant (i.e. dynamic) property will trigger initialization and this is not preventable using 'skipLazyInitialization()' and 'setRawValueWithoutLazyInitialization()' because these only work with known properties? While dynamic properties are deprecated, this should be clearly spelled out in the RFC for voters to make an informed decision. >>> `ReflectionClass::newLazyProxy()` >>> The factory should return a new object: the actual instance. >> >> * what happens if the user mis-implements the factory as `function (object >> $proxy): object { return $proxy; }`? >> * this is obviously a mistake on their end, but is it somehow >> preventable? >> > > Returning a lazy object (including an initialized proxy) is not allowed and > will throw. I've clarified this in the RFC (the RFC specified that > returning a lazy object was not allowed, but whether this included > initialized proxies was not clear). Relatedly: In the 'resetAsLazyGhost()' explanation we have this sentence: > If the object is already lazy, a ReflectionException is thrown with the message “Object is already lazy”. What happens when calling the method on a *initialized* proxy object? i.e. the following: class Obj { public function __construct(public string $name) {} } $obj1 = new Obj('obj1'); $r->resetAsLazyProxy($obj, ...); $r->initialize($obj); $r->resetAsLazyProxy($obj, ...); What happens when calling it for the actual object of an initialized proxy object? It's probably not possible to prevent this, but will this allow for proxy chains? Example: class Obj { public function __construct(public string $name) {} } $obj1 = new Obj('obj1'); $r->resetAsLazyProxy($obj1, function () use (&$obj2) { $obj2 = new Obj('obj2'); return $obj2; }); $r->resetAsLazyProxy($obj2, function () { return new Obj('obj3'); }); var_dump($obj1->name); // what will this print? Best regards Tim Düsterhus