Crates.io | expand_any_lifetime |
lib.rs | expand_any_lifetime |
version | 0.1.2 |
source | src |
created_at | 2024-02-20 16:12:53.987988 |
updated_at | 2024-02-20 16:22:50.223435 |
description | expand any lifetime to 'static with no unsafe rust |
homepage | |
repository | |
max_upload_size | |
id | 1146572 |
size | 2,863 |
DO NOT USE THIS IN ANY CODE YOU DON'T WANT MESS UP
You want to expand some lifetime without either call *::leak()
An issue had opened for decades
In essence, it's because static checking of multi-level lifetimes itself is inherently complex
Also check examples in cve-rs,
to find 'what kind of memory vulnerabilities we could face with unconditional lifetime expand'?