-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add PathBuf::leak
& OsString::leak
#389
Comments
I already have a half-finished impl of this that I'll submit if this is accepted |
I believe this can also now be done via: unsafe { OsStr::from_encoded_bytes_unchecked(os_string.into_encoded_bytes().leak()) } But removing the need for |
Yes, another, albeit trivial, point is that leaking a Box, while being safe, discards the extra unused space, which might incur a reallocation |
Only applies to |
Thanks for the ACP. Makes sense to me -- I am ready to accept a PR adding the 2 proposed methods as unstable. |
…ak, r=workingjubilee Implement `os_string_pathbuf_leak` implementation of rust-lang#125965 ACP: rust-lang/libs-team#389 [ Accepted ]
…, r=workingjubilee Implement `os_string_pathbuf_leak` implementation of rust-lang#125965 ACP: rust-lang/libs-team#389 [ Accepted ]
…ngjubilee Implement `os_string_pathbuf_leak` implementation of #125965 ACP: rust-lang/libs-team#389 [ Accepted ]
…ngjubilee Implement `os_string_pathbuf_leak` implementation of #125965 ACP: rust-lang/libs-team#389 [ Accepted ]
Proposal
Add a
leak
method tostd::path::PathBuf
&std::ffi::OsString
Problem statement
String
,Vec
,OsString
,PathBuf
, all 4 are common container types in the standard library, however, only 2 of them implement a way to leak their allocated memory:String
&Vec
,OsString
&PathBuf
are missing this functionality for no good reason.Motivating examples or use cases
Aside from simple consistency in the APIs, a use case for leaking
OsString
s &PathBuf
s which prompted me to write this proposal is using arguments provided through the CLI to perform a certain task that requires the strings to be shared, potentially across multiple threads.Solution sketch
Alternatives
The alternative is to do nothing, and force the users to leak
OsString
s &PathBuf
s viaor
Which doesn't seem to be justified by anything
Links and related work
https://doc.rust-lang.org/nightly/std/string/struct.String.html#method.leak
https://doc.rust-lang.org/nightly/std/vec/struct.Vec.html#method.leak
https://doc.rust-lang.org/nightly/std/boxed/struct.Box.html#method.leak
What happens now?
This issue contains an API change proposal (or ACP) and is part of the libs-api team feature lifecycle. Once this issue is filed, the libs-api team will review open proposals as capability becomes available. Current response times do not have a clear estimate, but may be up to several months.
Possible responses
The libs team may respond in various different ways. First, the team will consider the problem (this doesn't require any concrete solution or alternatives to have been proposed):
Second, if there's a concrete solution:
The text was updated successfully, but these errors were encountered: