Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:98880 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 58926 invoked from network); 25 Apr 2017 17:29:21 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 25 Apr 2017 17:29:21 -0000 Authentication-Results: pb1.pair.com smtp.mail=php@fleshgrinder.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=php@fleshgrinder.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain fleshgrinder.com from 77.244.243.89 cause and error) X-PHP-List-Original-Sender: php@fleshgrinder.com X-Host-Fingerprint: 77.244.243.89 mx108.easyname.com Received: from [77.244.243.89] ([77.244.243.89:39805] helo=mx108.easyname.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 5F/DC-36901-D678FF85 for ; Tue, 25 Apr 2017 13:29:18 -0400 Received: from cable-81-173-132-37.netcologne.de ([81.173.132.37] helo=[192.168.178.20]) by mx.easyname.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.84_2) (envelope-from ) id 1d34H2-0004JK-Qe; Tue, 25 Apr 2017 17:29:14 +0000 Reply-To: internals@lists.php.net References: <82da5975-aaca-580c-50ae-0b034d14b124@fleshgrinder.com> <5280684d-193b-dda8-efc6-903422522d7a@gmail.com> To: Sara Golemon , =?UTF-8?Q?Micha=c5=82_Brzuchalski?= Cc: Colin O'Dell , PHP Internals List , Stanislav Malyshev Message-ID: Date: Tue, 25 Apr 2017 19:28:58 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="IQluB2ln2rBgr6U4weFejBQHVr8nORE6K" X-DNSBL-PBLSPAMHAUS: YES Subject: Re: [PHP-DEV] [RFC] Enable strict_types checking for curl_setopt() From: php@fleshgrinder.com (Fleshgrinder) --IQluB2ln2rBgr6U4weFejBQHVr8nORE6K Content-Type: multipart/mixed; boundary="cNAUhouaMb3rXfbFreubPcFgolEfU5q9S"; protected-headers="v1" From: Fleshgrinder Reply-To: internals@lists.php.net To: Sara Golemon , =?UTF-8?Q?Micha=c5=82_Brzuchalski?= Cc: Colin O'Dell , PHP Internals List , Stanislav Malyshev Message-ID: Subject: Re: [PHP-DEV] [RFC] Enable strict_types checking for curl_setopt() References: <82da5975-aaca-580c-50ae-0b034d14b124@fleshgrinder.com> <5280684d-193b-dda8-efc6-903422522d7a@gmail.com> In-Reply-To: --cNAUhouaMb3rXfbFreubPcFgolEfU5q9S Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable On 4/25/2017 5:56 PM, Sara Golemon wrote: > On Mon, Apr 24, 2017 at 9:00 PM, Micha=C5=82 Brzuchalski > wrote: >> I agree with Stanislav. IMHO argument types are valueable when are >> reflective by reflection and curl_setopt has no valuable info by refle= ction >> and will never be. Curl implementation also uses resources cURL handle= is >> used. >> > Literally zero internal functions have argument type reflection > (beyond class and array types). curl_setopt() is not and would not be > any different in this regard. >=20 > https://3v4l.org/2BtPW >=20 >> Maybe it's time to refactor and provide objects with option setters >> with argument types? >> > I do agree there. I've got a WiP "cURLi" extention in my homedir that > I've been poking at since ZendCon 2016. I suppose if we don't put > type checking in curl_setopt() then that'll just push users who care > about type safety towards cURLi. :D >=20 > -Sara >=20 Way to go. This RFC is just wrong, and not _simply_ about semantics. --=20 Richard "Fleshgrinder" Fussenegger --cNAUhouaMb3rXfbFreubPcFgolEfU5q9S-- --IQluB2ln2rBgr6U4weFejBQHVr8nORE6K Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJY/4diAAoJEOKkKcqFPVVr92gQAJWYENweKWe3tts9BeySGQv2 zmgxX/UXbRIKwfpW6w33jCsBumrr4yt5YLZkiK2z9i6j6N04iJ1ruPwT2Qqu91Q7 sX4x6IjAUxtQNwk9t5rZCEYQkGV1lTJbCkusXKLIl6Ppr9ae0DsyKCYRtYf7EPGO /kCTP5D3A7Sdr66weKaLdgPoibUYeEtB7cUNUoJ1RDlDuU4M28IM+0p+3bKg0CRf 4bzEe6RHexanFUXvTxANvm3Ay1P0em1IpwD2jlwxmD7yorzGCf1ndWYdU0ewgUtC lu7uEUtTsgMk5HvaObruCsclbglEF94IuHqO6JM7ilRNkdN4/M2A4ISrnmYn+9w4 AhY67rZpshYkwqQV1SgdZQ1/x7JgDtIM/A7CwI4tTrIpysTzBHNPX5fBWj55r9wf Sbdtx6zhoK/l1kdLDSq+DLoUqgJKXIKpDzzlgwxSFG+/JLZjTSgT7zAZvzE61oIi jNYxnQMWfzzeY5z+QEpzLV8T9msdBfJxAa5iNwBr5IBxisEwVmpVugxfjseufERT QfFT+iUevHh/Kj+odgFt6ZPmuMzn+KM0QCHKNVZFYoXCm/lKaCczamN34iaNe5E9 JHHKYkAD1u6614OG4Pr5lfCUwuoMerh3nIWHdSjTBp/GNcKZT1j0O/kF5fxyjkBV TdbP7/Mn6pZXi8WRP27Z =0ji3 -----END PGP SIGNATURE----- --IQluB2ln2rBgr6U4weFejBQHVr8nORE6K--