Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:94910 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 32340 invoked from network); 8 Aug 2016 07:24:35 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 8 Aug 2016 07:24:35 -0000 Authentication-Results: pb1.pair.com smtp.mail=me@kelunik.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=me@kelunik.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain kelunik.com from 81.169.146.163 cause and error) X-PHP-List-Original-Sender: me@kelunik.com X-Host-Fingerprint: 81.169.146.163 mo4-p00-ob.smtp.rzone.de Received: from [81.169.146.163] ([81.169.146.163:21626] helo=mo4-p00-ob.smtp.rzone.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 4B/08-33134-FA338A75 for ; Mon, 08 Aug 2016 03:24:32 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1470641069; l=8012; s=domk; d=kelunik.com; h=Content-Type:Cc:To:Subject:Date:From:References:In-Reply-To: MIME-Version; bh=1JrF2qjndB1Ywmws/aFXtx+mESWx0NxpiZWvZCaIJFM=; b=mkc031Iv4fflWyy3YK2sam6P1V/tp8yfLu7JvGY3r35BzCksuYVIXmtCpA0IIWXXksN 4a/vDgNrKp+wnO6QM/7QLzEO20hHvGLLTHlZPurssSNVElfRL8vAH+poQIwaGCcX72z64 emVz/D1aFiDh/vh2qJVAuWHPj200xCiv2Z0= X-RZG-AUTH: :IWkkfkWkbvHsXQGmRYmUo9mls2vWuiu+7SLGvomb4bl9EfHtO3s6 X-RZG-CLASS-ID: mo00 Received: from mail-wm0-f48.google.com ([74.125.82.48]) by smtp.strato.de (RZmta 38.13 AUTH) with ESMTPSA id L0af04s787OR7HM (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp384r1 with 384 ECDH bits, eq. 7680 bits RSA)) (Client did not present a certificate) for ; Mon, 8 Aug 2016 09:24:27 +0200 (CEST) Received: by mail-wm0-f48.google.com with SMTP id q128so101475241wma.1 for ; Mon, 08 Aug 2016 00:24:27 -0700 (PDT) X-Gm-Message-State: AEkoouuYD6hvaYytmI7/hiNTBnVmxuRMfL4OfT0TaVInfYMBS+rXmPWnHiQFbM7eKZLjhyu1DlVRC4yo5DLThQ== X-Received: by 10.195.11.104 with SMTP id eh8mr82593009wjd.128.1470641067336; Mon, 08 Aug 2016 00:24:27 -0700 (PDT) MIME-Version: 1.0 Received: by 10.28.27.206 with HTTP; Mon, 8 Aug 2016 00:24:26 -0700 (PDT) In-Reply-To: References: Date: Mon, 8 Aug 2016 09:24:26 +0200 X-Gmail-Original-Message-ID: Message-ID: To: Yasuo Ohgaki Cc: Pierre Joye , PHP internals , Christian Stadler Content-Type: multipart/alternative; boundary=047d7b874df4693e0105398a4ef2 Subject: Re: [PHP-DEV] Adding validate_var_array()/validate_input_array() to which version? From: me@kelunik.com (Niklas Keller) --047d7b874df4693e0105398a4ef2 Content-Type: text/plain; charset=UTF-8 2016-08-08 0:20 GMT+02:00 Yasuo Ohgaki : > Hi Pierre, Niklas > > On Sun, Aug 7, 2016 at 9:20 PM, Pierre Joye wrote: > > I would not rush it into 7.1. > On Mon, Aug 8, 2016 at 12:20 AM, Niklas Keller wrote: > > Isn't it a bit late to target 7.1 anyway? > > I feel the same way indeed. However, it does not change existing > feature at all, but this is a pure addition. It's one of the largest > mandatory piece that PHP is missing. It's good for 7.1.0, IMO. > (Another largest piece is escaping API for basic needs. e.g. > we don't even have JavaScript string escape API.) > > I made choices for targeted version, 7.1.0 or 7.2.0 > Feature freeze has been beta1. If the RM says it's too late, we don't need a vote. It's too late. Regards, Niklas > https://wiki.php.net/rfc/add_validate_functions_to_filter > > If this RFC is passed for 7.2.0, then we can adjust the feature until > its release. > > > > But anything proposed is already possible very easily in userland. > > This part is debatable. To implement feature that provides > filter_require_*() and validation filter behavior with them, users > have to write many lines of code. Some features are hard to implement > in user code such as INT/OCTAL/HEX overflow detection. > > > > I see them as conditions flow not errors per se but flow. > > Invalid options could raise exceptions but it brings inconsistencies > with the other filter functions. > > I really think we should have Exception handling standard in > CODING_STANDARD, too. > This issue could be handled by PHP 8.0 or PHP 7.2. > > > I feel like this rfc needs more discussions and maybe we will add more > things to filter as well. > > Validation filters with new functions are made to work conservative > way. So it would not be a issue relaxing them later. > > Use of exception is issue. IMO, it would be more useful if there is > filter validation exception object that has more details in it. i.e. > Offensive input key, data, filter name and filter options, remove > filter_get_invalid_key(). I may add the new exception, > FilterValidateException. (I choose "Validate" here, since most > exceptions will be raised by validation filters) > > In fact, I don't like the way exception works currently. I'll add > mentioned FilterValidateException before vote. Does this make you feel > better? > > I feel the feature is fully implemented if I add FilterValidateException. > > Regards, > > P.S. There is conflicting pressures on RFC. I need to minimize changes > so that reviewer can understand the RFC easily, but I would like to > implement feature fully. Some changes cannot add/work well > individually. This exception issue is one of them, another is > https://wiki.php.net/rfc/precise_session_management It includes > mandatory feature for proper/secure session management and implements > all possible features that would be required. Yet, it is declined :( > > -- > Yasuo Ohgaki > yohgaki@ohgaki.net > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php > > --047d7b874df4693e0105398a4ef2--