Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:98843 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 11025 invoked from network); 22 Apr 2017 11:40:42 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 22 Apr 2017 11:40:42 -0000 Authentication-Results: pb1.pair.com smtp.mail=colinodell@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=colinodell@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.223.169 as permitted sender) X-PHP-List-Original-Sender: colinodell@gmail.com X-Host-Fingerprint: 209.85.223.169 mail-io0-f169.google.com Received: from [209.85.223.169] ([209.85.223.169:34213] helo=mail-io0-f169.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id BA/52-65481-9314BF85 for ; Sat, 22 Apr 2017 07:40:42 -0400 Received: by mail-io0-f169.google.com with SMTP id a103so143932292ioj.1 for ; Sat, 22 Apr 2017 04:40:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=aCpsVgORW39m46fLxmRbuk5Dkth9udHYQmfJWyvZlm0=; b=X+NyUWqUKtPdUGm+yCj5E62FPhMwpIrCCn7l+RyRngpNOMjeyp/aVElp93bmazG5nR 0Y2Wystw6rTrSYdxhNu2hoea60TVDLIUTGDbbu9AALhRxI2lYgbsSsaZIsYUqRQK1FB7 mIU9hdfWTKeNfJ7moIO0IZ9F6zwQAJvhxB2OVoW7Zstk3h/5sS5keWSMO92gGm4Ddjb2 EqASbJshNfPJTVhsxsHmExYCRD7Xh7zt3d2QY5agWsblZd/YsVWPRN7MEBh4A4VPjP0Q Cf2z+Ha1n5FoiJzB1BfGYbBT7KwlihHYnLKe3Uv3VsLt9m2N5+NhkskenfNvl7YmFGtF 7tzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=aCpsVgORW39m46fLxmRbuk5Dkth9udHYQmfJWyvZlm0=; b=brDuZcoknDNv3Zkq0yae9mlG2nW9BX9fMOeyowvr6+nAwZI5r7pc6M6lumkGtU353y o9vKS5ol94t4MC0SirPU0FMe4n7tuXEdP9H0QxCRatAvyboTCq8UWPVeA1b/PfJlPhps Sy9LRxwNY5V2tss/gLub5abieHO2khB5WvXOzwMmePAEZd6JpxII849e1bJgjCupUxmy nqx9929AKWKX5Yzwd7cOyltefXG/CwHfD4mwN+wW1hITk1/lseCnKK3ld4Lic+c2b/o9 lasNaXTrj1HZw3cWib0vlLYUSmhd8nSV3TYgrYGgA08pSfmgWAPhzofo5GY7xCIVBBSp lm+w== X-Gm-Message-State: AN3rC/53D6eLqYJZssPL/pVyr9DBpjAPc9njSfkxhQoFEGW0yLUluz6i AFERXFEZhG4OlHYpTAo7AXF0+x2chnOU X-Received: by 10.107.160.77 with SMTP id j74mr1330187ioe.58.1492861238609; Sat, 22 Apr 2017 04:40:38 -0700 (PDT) MIME-Version: 1.0 Date: Sat, 22 Apr 2017 11:40:27 +0000 Message-ID: To: PHP Internals Content-Type: multipart/alternative; boundary=001a114098e8d38bdf054dbfd71e Subject: [RFC] Enable strict_types checking for curl_setopt() From: colinodell@gmail.com ("Colin O'Dell") --001a114098e8d38bdf054dbfd71e Content-Type: text/plain; charset=UTF-8 Hello internals, I'd like to propose an enhancement to curl_setopt() which is used to configure a given curl session. The second argument of this function defines which option to set and the third argument provides the corresponding value to use. Because each option expects the value to be a specific type, it makes sense to enforce these types in strict type checking mode. I'd therefore like to propose that we introduce strict type enforcement inside curl_setopt() when "declare(strict_types=1);" is being used. The full details of the proposal, including the proposed patch, can be found here: https://wiki.php.net/rfc/curl_setopt_strict_types Huge thanks to Sara Golemon for the idea and creating the patch! Cheers, Colin O'Dell colinodell@gmail.com --001a114098e8d38bdf054dbfd71e--