Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:125628 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id 6BF991A00BD for ; Thu, 19 Sep 2024 10:17:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1726741188; bh=+cX9ERckThHPjjl1ybyXIhDtD+rSDamXHXqDBw7ncvc=; h=Date:To:From:Subject:From; b=ZTD4/qI5ZU/AOsndB7QRTRfftmql8j+V3sgbExVV+Q+umE8Y6/wLxxr+81voAVqVm kcMS6rcmO+30NacAg5R7XWKjfjsPuYkUDBBrhYhHoCdZCCpU5afaw6R2030PPih3hT PrXYkrGAgRsqiRzLHBbDBZC5pyDA19rsxly846uu1vEF5YTqM9QWBzJprDJUvWV+IW MoYsJpCrh6m7KZ5XTjKdZrNV6GM/6B6k50sLg3FngxiztwHTOg5XcQrQ5D2vdW5zpx P4n6/TlMYxZVn7N9MrAccdifhWN3gvcvyd4/KabW3geYGesN53ewomJjvZi7bPPydX n08Lx2OXkxvPQ== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id A756518004A for ; Thu, 19 Sep 2024 10:19:47 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS, FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: No X-Envelope-From: Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Thu, 19 Sep 2024 10:19:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmx.de; s=s31663417; t=1726741059; x=1727345859; i=cmbecker69@gmx.de; bh=eFsY9AV4OuEhVmzCa9E7J6OiV7Em/8hllURhWjJ/bqE=; h=X-UI-Sender-Class:Message-ID:Date:MIME-Version:To:From:Subject: Content-Type:Content-Transfer-Encoding:cc: content-transfer-encoding:content-type:date:from:message-id: mime-version:reply-to:subject:to; b=G0yAhgVaSQqX/Bnz/Sba2JYX7OgN67rQzE3VnBb1e4C7iL6492/y0xs8mj5wKivX 99xQzdPhf0aW5I3SeiZfhd9Sz/IVcFa2tD9MzHpm+KG+LjUSn+YDtFAFX8NnRP+cH 8pgWc4lB0BqVW/es/ydez6egs2gBMTna90dIFxbXFwOOgGq0Zibsapz3qommCg0Nc QLlInbJbUX893x97kSKGgVUnohs/Zco9sZusxxSo7JJ6qqBOUW2wb4gwwEtSrEIA7 UzYcfULbu723vLN9tILnCp8A8DhFkIyDvONNIIZ9BsrVNAi2CNECRrNWH1zYHU/Zk kRDnk4Iv9jObUpzT+g== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [192.168.2.130] ([79.251.205.37]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1Mt79P-1rxkAE1Hlh-015WMS for ; Thu, 19 Sep 2024 12:17:39 +0200 Message-ID: Date: Thu, 19 Sep 2024 12:17:38 +0200 Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net x-ms-reactions: disallow MIME-Version: 1.0 User-Agent: Mozilla Thunderbird To: PHP internals Content-Language: de-DE Subject: [PHP-DEV] Clarification about deprecate proprietary CSV escaping mechanism Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:yvzetbxXP3yPOJD8KFKYBqWZGlHJg4XjyA4e4pKmb761uonNgdR Hdxz04cBtvQHqD2gm/AS922Y6SYt2eCYv1Ur9kw/TSWz8LjS25IscVh9NdlU7Nc2ij1xTS4 xRX5jClx7MAxEQxB0SDq+D93ZMJUQdz/r4GD+V2P7+mosDTPxfLbTKyJ33Am25eZF+/0R4s z32NcYAMXxe2U0KGmr3oA== UI-OutboundReport: notjunk:1;M01:P0:yPZ1U+XqhhM=;QbyAEfipp+PZ6Ili9f+jjoDLgoc L+LV5lNBNgsOdCJggzAtSlGDZ4DeCLIDhPmODrDx3r5RvKK3QR3UVlwrMvXd2Kx1vXdneJDKf YFFaVAADL+opR0Bb6cVlWTITdD4uz8xzMJTW/ouqBWp0MHbxygWrWJOAcw4F4SxgynqqIZ19z Xx0qj4fvkEJnTZIqUe/J+GnzE2MBruK5Z8NUtn8nFjFz8CNTqlh/zjZUID+1P3a0gOS0cqSVA HRY4jvFxCghD8JL0hFzQJx7u8EvMoeEGT5cMogqRRqZtJ9Kv/xVxHGbM5e+wvq4iSqwAY7uli ZT307mqQk6aCdkbO1OgmEN+/ZitweqXzsq7tM6IKfTNH5BD0WgFs8wFPlNR+FgGHg5DQL3IQu GtM/rPu1JuyoKwPMAfhPLjIFwNaYJO9zmtlQZfDgkgRwxk7RKUMTwEwsS3jcQaQe7rqcLVrAj 98+bXt87zvhn3TR+SVEvMeZP4U0aQB5CrnAEU9lg7vdrbLtRRSlVz5zngRPNTMH/Fcjn+YpDp Xzxlg9EwXC7j9Yj5B0/dBRxhKmlDzwX5wtskr61asCiQB+8xpGLHNr45TTqCYP9BqtrodurmY fMsJDDJMXneTR3yIJD5cre8BGU3ZGURoPXdyx5RPSj1X2WIbUP/9EjcuJPg1yLiyJi3YpNfhs T/LtNvjT+yISp1CGpVfZ7yp3jfDSOoTOk7MlPu9SH0u8D1VFPtNLCDHYHw0Zb5a8CFJv2XbPn 66sGbsnD2Qz4WV9UUOFpLOiE/Lg+LQO8j78YTgg34rLE+Ghn8ZCiwVRKmqZqfbH5iAEDyPYgN +LFHARKUHZkEoDuwUfTX5Dye5V8mdSgKol6lwuzjsIMRw= From: cmbecker69@gmx.de ("Christoph M. Becker") Hi all, there is some debate regarding the implementation of the "Deprecate proprietary CSV escaping mechanism" RFC section[1], which needs clarification from the list, in my opinion. That RFC section perhaps used some unclear wording: | Which is to deprecate passing a non-empty string to the $escape | parameter to all the CSV related functions, [=E2=80=A6] The original implementation[2] raised deprecation warnings only when a non-empty string has been passed *explicitly*. That still left a loophole when *implicitly* passing a non-empty string (i.e. using the parameter default). This loophole has been closed via a follow-up PR[3], where the debate came up. Now, the argument has been brought up that this effectively makes the parameter mandatory, and that change would not have been according to the RFC section, possibly invalidating the vote. How should we proceed? Note that we're only 5 days away from feature-freeze/branch cut. [1] [2] [3] Christoph