Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:126976 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by qa.php.net (Postfix) with ESMTPS id 61DA41A00BC for ; Sun, 30 Mar 2025 11:12:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1743332989; bh=++6YFR4ycemZplpsrbnBT6BwYTw7MbhxDs+lFIwriIo=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=XogPGmCwbm+Nx+YuIQp5NxlJWvkDe9mqXvFS3pZ3GN1ydTr98jfnD05jFhN3+JliQ rUFlYxcGSJ78F16V2A1sYNncFWOPHhUVgTgeGlvKmwkrpybxhimoJ0KZ84aWUnolj8 PaeId4apJU8GDrP8WCa+Upsmaot3aq/MuDlG097gBjjQiQtsQoJiH0B7Xs6prAqMkL x1OaVj3+yGIm493HTTGGQr6brd4aFLzhnco57G00d3bnyNoIjvajfdq+a9Jr/GxrSF A3gMXc62tgZboyyXYe0a7EOnOHEqkaPZQGCBiKe46mAlp6m8Iu49NDN9CpJKXiHp8q XBvh58f92UDOA== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 95AB0180068 for ; Sun, 30 Mar 2025 11:09:47 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_PASS,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=4.0.0 X-Spam-Virus: No X-Envelope-From: Received: from chrono.xqk7.com (chrono.xqk7.com [176.9.45.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Sun, 30 Mar 2025 11:09:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bastelstu.be; s=mail20171119; t=1743333132; bh=lz8VAJdqq3XjtEvarM039bmwS0NX40wwK6BP/Gt6jls=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type:from:to:cc:subject:message-id; b=M6fxWDZBKE9y9QKh1adlIVWZuMIpIfpjbAKkGFE1Ogyr2O0eEf7fd1Dkl9m1JzjnZ jMQ3uZB7wsycIujcMlSEtUzy+CCekIxDxDD7idogLFe55W4LqPfThNECdd8vdaN3Da UvYm8y3+tENIqqggDcR6pWa/aZhtzUVprb9qCvV5uKQn1HrmUKkHIG8BAGgCSeNZk5 2PQHnxUdIK/jj/rNRa6A2ES0FqXfzxuUCInTQSfM2i0rdwItotX5+u9yQgKjo/bf2P mgA5ymBnF/u5wdzwn9xHtyIWvvtfCt6j/ibVKxolrAPOq3w1JCqxe2CEc/eDmltPKG tLEVXlqOUHA0g== Message-ID: Date: Sun, 30 Mar 2025 13:12:09 +0200 Precedence: bulk list-help: list-post: List-Id: internals.lists.php.net x-ms-reactions: disallow MIME-Version: 1.0 Subject: Re: [PHP-DEV] [RFC] [Discussion] Add WHATWG compliant URL parsing API To: =?UTF-8?B?TcOhdMOpIEtvY3Npcw==?= Cc: "Gina P. Banyard" , PHP Internals List References: <17bdbfa35c920a86a19690e356e05f99@bastelstu.be> Content-Language: en-US In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit From: tim@bastelstu.be (=?UTF-8?Q?Tim_D=C3=BCsterhus?=) Hi On 3/12/25 23:00, Máté Kocsis wrote: > I'm not sure if I'm entirely correct, but it's possible that a 3rd party > URI implementation > won't (or cannot) use PHP's memory manager, and it relies on the regular > malloc: > in this case, even memory errors could lead to failures. We already discussed this in private and the UriOperationException was removed from the RFC, but for public record: Something like a memory allocation error is not actionable by the user. Thus it should be an `Error` (rather than an exception) or a bail out. Perhaps the engine will one day support gracefully handling the memory limit being exceeded with an OutOfMemoryError being thrown in that situation. Then it would also fit nicely for any URI implementation. Best regards Tim Düsterhus