Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:89982 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 56974 invoked from network); 4 Jan 2016 00:37:43 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 4 Jan 2016 00:37:43 -0000 Authentication-Results: pb1.pair.com smtp.mail=php@golemon.com; spf=softfail; sender-id=softfail Authentication-Results: pb1.pair.com header.from=php@golemon.com; sender-id=softfail Received-SPF: softfail (pb1.pair.com: domain golemon.com does not designate 209.85.217.180 as permitted sender) X-PHP-List-Original-Sender: php@golemon.com X-Host-Fingerprint: 209.85.217.180 mail-lb0-f180.google.com Received: from [209.85.217.180] ([209.85.217.180:36270] helo=mail-lb0-f180.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id D9/B5-28689-6DEB9865 for ; Sun, 03 Jan 2016 19:37:43 -0500 Received: by mail-lb0-f180.google.com with SMTP id oh2so151447687lbb.3 for ; Sun, 03 Jan 2016 16:37:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=golemon-com.20150623.gappssmtp.com; s=20150623; h=mime-version:sender:date:message-id:subject:from:to:content-type; bh=XMst4Eu/Xqy+W9L1SdbrvXsiQVBdrEkffF8EIWJRuJQ=; b=CjvPlxLEqtGCCHKMYPL/znVVIS5XDAfDEqOHJz8eUva1TFwzkQTxK+sRZWgEATkJUf wEr7JHHf98n7jum86aE9T/7IZDTjfSVtpGdoDWxDcj7Evjb2uXVVI8RXR+PVWMS7HbWX Xy0Qajw61LtG4ZHDO+n5Aphb+91hcwODCAcuF2qdkXCY7vmI3nuZ9dixzqeE2EONawT6 ApVKxU1jg5pKTlTu2fgIT9hyja0AQBLognwWZp1BEjx6utEvGt7LbqWJ4h5SaeVILtX8 p01C8f43COYUBhQDtfjG6MBxOIW2/2fnbq7W/JArpha4UN+UtId798P3f/veLOyfNR2A G81w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:date:message-id:subject:from :to:content-type; bh=XMst4Eu/Xqy+W9L1SdbrvXsiQVBdrEkffF8EIWJRuJQ=; b=b5WfKfjA16KcTOyH+9utU3evj1nFvcvRYCuEeBbi/owgDmu2lSpL1iKMD36ebNszc2 K0uz/x8ApoNCi0FsY/elA9RdDYr+3sskLHk1t1qlgU22mt3+QdPO/+CowycThcYe2XlQ 8Xb651157ZVZn7B6jzkB70KVHZVLft//19tsHmpQ6+4ntcHAD8CMLG1HjvbAtLwXflG1 m3np0IWoRhnCiTNbQ7m7n0sg2PLs/4+O6ITj1EdOwK5Ny4iwLSaohGP9KQv1e6EK4snn DXdDwiae9wdL7AemQqbM73o/g5KV/+Af3ov6sFENQO7meHTQVOuW/HqZGKtvZCvI1Ioa xp+w== X-Gm-Message-State: ALoCoQmm7YQuJVRT+2ayK14VFjnGC26MNp/HbEkYzLqgRvGIVukKYwy5495UAm+rVRb8nGn6Bx1SQ/U3Sm02+WCftV4GfLtd9g== MIME-Version: 1.0 X-Received: by 10.112.132.66 with SMTP id os2mr17814540lbb.111.1451867858649; Sun, 03 Jan 2016 16:37:38 -0800 (PST) Sender: php@golemon.com Received: by 10.112.37.44 with HTTP; Sun, 3 Jan 2016 16:37:38 -0800 (PST) X-Originating-IP: [107.198.91.68] Date: Sun, 3 Jan 2016 16:37:38 -0800 X-Google-Sender-Auth: SAXQBjH1I475_pZ9uZll8Tn6bgA Message-ID: To: PHP internals Content-Type: text/plain; charset=UTF-8 Subject: [RFC] Differentiate op from assign-op in operator overloading From: pollita@php.net (Sara Golemon) This is a separate proposal from the userspace operator overloading I put up for Patricio yesterday and aims to fix what I see as a bug in our operator overloading implementation (though some may disagree). It specifically only seeks to differentiate const operations which produce a new value from mutations which alter an existing overloaded object. https://wiki.php.net/rfc/assignment-overloading