Description
Proposal
Problem statement
It is frequently desirable to prevent creation of files outside a given directory.
Motivating examples or use cases
archive extractor programs (eg. tar
, unzip
) usually do not allow extracting to an absolute path, instead removing the leading /
.
Solution sketch
impl Path {
/// remove any leading `/`, then remove any leading `..` sections
fn force_relative(&self) -> PathBuf;
}
Alternatives
- proper sandboxing virtual filesystems, similar to go
fs.FS
. both this and the current proposal would need additonal help to prevent symlink escapes. - convert to string and do manual manipulations (unlikely to function properly on Windows)
- have the function return
&Path
. saves an allocation and works for the basic case where it only needs to trim charachters from the start - have the function return
Cow
, saving an allocation in the trimming and passthrough cases, but slightly increasing complexity - delegate this to an external crate (unergonomic, requires an extension trait or function call syntax, rust already has too many trivial single-function crates, may become unmaintained, has security implications...)
Links and related work
golang fs.FS
tar(1), see the --absolute-names
option.
What happens now?
This issue contains an API change proposal (or ACP) and is part of the libs-api team feature lifecycle. Once this issue is filed, the libs-api team will review open proposals as capability becomes available. Current response times do not have a clear estimate, but may be up to several months.
Possible responses
The libs team may respond in various different ways. First, the team will consider the problem (this doesn't require any concrete solution or alternatives to have been proposed):
- We think this problem seems worth solving, and the standard library might be the right place to solve it.
- We think that this probably doesn't belong in the standard library.
Second, if there's a concrete solution:
- We think this specific solution looks roughly right, approved, you or someone else should implement this. (Further review will still happen on the subsequent implementation PR.)
- We're not sure this is the right solution, and the alternatives or other materials don't give us enough information to be sure about that. Here are some questions we have that aren't answered, or rough ideas about alternatives we'd want to see discussed.