-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attribute request: called_from. #2815
Comments
What sort of use case leads to a |
For unsafe functions specifically, unsafe and safe functions should generally be in a module together which exposes a safe boundary. Having a public unsafe function which should only be called from one place in another module does indeed feel like a mistake in design. |
Agreed with the above. Also worth noting that |
But I need this project design, since the attribute |
It is not advisable for me to use |
It's possible to use |
It's not solution for me. And I need set visibility on specific function, not module. |
Can you give an example of your setup so that we can better understand the situation? |
For example:
|
fundamentally, safe code that is only safe if called from a specific other function isn't safe code. either make bar actually always be safe or remove the forbid(unsafe_code) from foo and make it use an unsafe block. |
It's possible to create proc_macro lib for adding this attribute? |
a proc-macro gets tokens as input and had tokens as output. However, using just the tokens of a function as input you cannot read where else in the program that function is called from. Is there a reason you cannot change how you use this unsafe code? Your proposed design seems very easy to misuse on accident. |
Reason: increased security requirements. |
That doesn't increase security though. |
It may look like paranoia, but it is necessary |
For code to be marked safe it has to be legal to call from anywhere. If your code can't be called from anywhere don't mark it safe. Moving it into a module marked safe where all the unsafe blocks go, but that you can't actually be called from everywhere, is just giving yourself more problems. You should attempt to engineer the code differently. For example you could require the functions take a reference to initialization token to prove that an API has been started properly. |
If I will use initialization token, how I can deny moving it to other modules? |
the module location doesn't matter. but also, you could use normal item visibility if you really have to. |
Please, add attribute "called_from", for strongly checking caller fn. For example, it's needed when all unsafe fn's moved to one module, and each such fn must be called only from relevant fn in another module.
The text was updated successfully, but these errors were encountered: