Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:97673 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 64305 invoked from network); 11 Jan 2017 11:32:11 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 11 Jan 2017 11:32:11 -0000 Authentication-Results: pb1.pair.com header.from=me@kelunik.com; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=me@kelunik.com; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain kelunik.com from 81.169.146.217 cause and error) X-PHP-List-Original-Sender: me@kelunik.com X-Host-Fingerprint: 81.169.146.217 mo4-p00-ob.smtp.rzone.de Received: from [81.169.146.217] ([81.169.146.217:26596] helo=mo4-p00-ob.smtp.rzone.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 86/0C-55699-9B716785 for ; Wed, 11 Jan 2017 06:32:09 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1484134326; l=4229; s=domk; d=kelunik.com; h=Content-Type:To:Subject:Date:From:MIME-Version; bh=2O1eEJPKtm9s25wY/Iifip/zfANtFb4cjAE7f/DHe9U=; b=lYy44rCz6aPtwbvbyGd+ojhuU/oumV/QMUR34Y3PynUYQfz6ROYch6cBgJuvgeQaOz yBNCZ7Ya0NJzd0GjF6i8PN6u/hiCb3HmiP6/ahcxWgP1BH7HYB9xYdRWJvInJPBmjzBe To/TTqbQXpMoWxjOfys4q9Dwrni0tXr9QXaEg= X-RZG-AUTH: :IWkkfkWkbvHsXQGmRYmUo9mls2vWuiu+7SLDup6E67mzuoBPBqD/sWo= X-RZG-CLASS-ID: mo00 Received: from mail-qk0-f171.google.com ([209.85.220.171]) by smtp.strato.de (RZmta 39.11 AUTH) with ESMTPSA id V08643t0BBW60w0 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp384r1 with 384 ECDH bits, eq. 7680 bits RSA)) (Client did not present a certificate) for ; Wed, 11 Jan 2017 12:32:06 +0100 (CET) Received: by mail-qk0-f171.google.com with SMTP id 11so106626924qkl.3 for ; Wed, 11 Jan 2017 03:32:06 -0800 (PST) X-Gm-Message-State: AIkVDXLnmz0nTiv3vVRwtmMJPp57m0J6RgFrNpE0KAOWhRbcMC3n9EkSl4/Q71EPySGapmKpPZfDTGC9c8mnqg== X-Received: by 10.55.103.214 with SMTP id b205mr7395767qkc.142.1484134325692; Wed, 11 Jan 2017 03:32:05 -0800 (PST) MIME-Version: 1.0 Received: by 10.12.141.204 with HTTP; Wed, 11 Jan 2017 03:32:05 -0800 (PST) Date: Wed, 11 Jan 2017 12:32:05 +0100 X-Gmail-Original-Message-ID: Message-ID: To: PHP Internals Content-Type: multipart/alternative; boundary=94eb2c05980a4856260545cff3ee Subject: [RFC][VOTE] Parameter Type Widening (Resume) From: me@kelunik.com (Niklas Keller) --94eb2c05980a4856260545cff3ee Content-Type: text/plain; charset=UTF-8 Morning Internals, I just resumed the vote on "Parameter Type Widening", initially named "Parameter No Type Variance". RFC: https://wiki.php.net/rfc/parameter-no-type-variance Voting will keep open for three weeks counting from the initial opening on the 9th of January and close on 30th of January, probably in the evening of UTC, as originally planned. You can find an excerpt of the RFC below. ---- PHP currently doesn't allow any variance of parameter types when checking whether a method implemented in a class is compatible with the method defined either in the parent class or interface. This RFC proposes to allow omitting a type entirely in a subclass, as dropping all parameter constraints is always valid according to the contravariance rule. Implementing this RFC would allow libraries to be upgraded to use type declarations in their method signatures. Currently adding types to a method of a class in a library would break any code that extends that class. This would provide an easier upgrade path for libraries to start using scalar types, to replace manual checks being done inside the methods, without requiring an update for all sub-classes. ---- I resumed the previous voting instead of resetting it, as the voting period is still longer than two weeks from now. Kind Regards and Happy Voting, Niklas Keller --94eb2c05980a4856260545cff3ee--