-
Notifications
You must be signed in to change notification settings - Fork 1.7k
RFC: Trait Implementation Privacy with permits
#3903
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
HackingRepo
wants to merge
4
commits into
rust-lang:master
Choose a base branch
from
HackingRepo:patch-1
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+205
−0
Open
Changes from all commits
Commits
Show all changes
4 commits
Select commit
Hold shift + click to select a range
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Some comments aren't visible on the classic Files Changed page.
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,205 @@ | ||
| # RFC: Trait Implementation Privacy with `permits` | ||
|
|
||
| - Feature Name: `trait_permits` | ||
| - Start Date: 2026-01-03 | ||
| - RFC PR: rust-lang/rfcs#0000 | ||
| - Rust Issue: rust-lang/rust#0000 | ||
|
|
||
| ## Summary | ||
|
|
||
| Introduce a new syntax for restricting trait implementations to specific crates: | ||
|
|
||
| ```rust | ||
| trait Test permits mycrate_extra, crate { | ||
| fn run(&self); | ||
| } | ||
| ``` | ||
|
|
||
| ## Motivation | ||
| Rust currently allows any downstream crate to implement traits for types they own, subject to the orphan rules. While flexible, this can lead to: | ||
|
|
||
| Accidental or malicious impls: External crates can implement traits in ways that break invariants. | ||
|
|
||
| Audit difficulty: It is hard to know which crates are allowed to implement a trait. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It is generally very simple to work out how the Orphan Rule applies. The |
||
|
|
||
| Boilerplate sealed traits: Developers often use the "sealed trait" pattern to prevent external impls, which is verbose and indirect. | ||
|
|
||
| By introducing permits, Rust gains a first-class mechanism for trait implementation privacy, improving safety and clarity. | ||
|
|
||
| ## Guide-level explanation | ||
|
|
||
| The `permits` clause allows trait authors to specify which crates may provide implementations of the trait. | ||
|
|
||
| ```rust | ||
| pub trait Test permits crate, mycrate_extra { | ||
| fn run(&self); | ||
| } | ||
| ``` | ||
|
|
||
| crate refers to the defining crate. | ||
|
|
||
| Other identifiers refer to external crates by name. | ||
HackingRepo marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| If no permits clause is present, behavior is unchanged (any crate may implement the trait, subject to orphan rules). | ||
|
|
||
| This makes trait privacy explicit and auditable, without relying on sealed traits. It allows traits to be widely used across the ecosystem while restricting who can implement them, reducing accidental or malicious impls and improving auditability. | ||
|
|
||
| Code | ||
|
|
||
| ## Reference-level explanation | ||
|
|
||
| ### Syntax | ||
|
|
||
| A trait definition may include a `permits` clause: | ||
|
|
||
| ```rust | ||
| trait TraitName permits crate, other_crate, another_crate { | ||
| fn method(&self); | ||
| } | ||
|
|
||
|
|
||
| ### Semantics | ||
| Only the listed crates may provide impl TraitName for Type. | ||
|
|
||
| Attempting to implement the trait in a non-permitted crate results in a compiler error. | ||
|
|
||
| Trait objects (&dyn TraitName) remain usable across crates, but only permitted crates can provide concrete impls. | ||
|
|
||
| Example | ||
| ```rust | ||
| // In mycrate/lib.rs | ||
| pub trait Test permits crate, mycrate_extra { | ||
| fn run(&self); | ||
| } | ||
|
|
||
| // In mycrate_extra/lib.rs | ||
| use mycrate::Test; | ||
|
|
||
| struct ExtraType; | ||
| impl Test for ExtraType { | ||
| fn run(&self) { println!("extra"); } | ||
| } | ||
|
|
||
| // In othercrate/lib.rs | ||
| use mycrate::Test; | ||
|
|
||
| struct OtherType; | ||
| impl Test for OtherType { | ||
| fn run(&self) { println!("other"); } | ||
| } | ||
| // ERROR: Trait `Test` does not permit implementations in `othercrate` | ||
| ``` | ||
|
|
||
| ### Diagnostics | ||
| When a non-permitted crate attempts to implement a restricted trait, the compiler emits an error pointing to the trait definition and listing permitted crates: | ||
|
|
||
|
|
||
| ```rust | ||
| error[E0XXX]: trait `Test` does not permit implementations in crate `othercrate` | ||
| --> othercrate/src/lib.rs:5:1 | ||
| | | ||
| 5 | impl Test for OtherType { /* ... */ } | ||
| | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
| | | ||
| = note: permitted crates for `mycrate::Test`: `crate`, `mycrate_extra` | ||
| = help: consider using a wrapper type or requesting inclusion in the permits list | ||
| ``` | ||
|
|
||
| ## Drawbacks | ||
| Reduced flexibility: Downstream crates cannot extend traits unless explicitly permitted. | ||
|
|
||
| Ecosystem impact: Existing crates relying on open trait impls may break if traits adopt permits. | ||
|
|
||
| Complexity: Adds another axis of privacy control to the language. | ||
|
|
||
| ## Rationale and alternatives | ||
|
|
||
| Several approaches exist today to restrict trait implementations, but each has limitations compared to a language-level `permits` clause: | ||
|
|
||
| - **Sealed trait pattern** | ||
| Authors define a private marker trait and make the public trait inherit from it. | ||
| This prevents external crates from implementing the trait, but it requires boilerplate and is not discoverable in documentation. | ||
| `permits` encodes the restriction directly in the trait definition. | ||
|
|
||
| - **Documentation and conventions** | ||
| Library authors may state in docs that a trait should not be implemented externally. | ||
| This relies on ecosystem norms and cannot prevent accidental or malicious impls. | ||
| `permits` provides compiler enforcement rather than social convention. | ||
|
|
||
| - **Visibility restrictions** | ||
| Making a trait non-`pub` blocks external use entirely, not just external impls. | ||
| This is too coarse: traits often need to be widely usable but narrowly implementable. | ||
| `permits` allows fine-grained control. | ||
|
|
||
| - **Attributes instead of syntax** | ||
| An attribute like `#[permits(crate, mycrate_extra)]` could encode the restriction. | ||
| However, a keyword clause improves clarity in signatures and avoids attribute proliferation. | ||
|
|
||
| - **Tooling-only solutions** | ||
| Lints or Clippy rules could warn about external impls, but they cannot guarantee enforcement across crates. | ||
| A language-level mechanism ensures consistency and reliability. | ||
|
|
||
| The `permits` clause is chosen because it is explicit, ergonomic, and auditable. It integrates naturally into trait definitions and provides compiler-backed enforcement, reducing reliance on patterns or conventions. | ||
|
|
||
|
|
||
|
|
||
| The permits syntax provides a direct, ergonomic way to restrict trait implementations to specific crates, improving safety, auditability, and clarity compared to current patterns. | ||
|
|
||
|
|
||
| ## Prior art | ||
|
|
||
| Rust developers today often rely on the **sealed trait pattern** to restrict external implementations. This involves defining a private marker trait and making the public trait inherit from it, preventing downstream crates from writing impls. While effective, it is verbose and indirect, and the restriction is not visible in documentation. | ||
|
|
||
| Other languages provide similar mechanisms: | ||
|
|
||
| - **Swift** distinguishes between `open` and `public` to control subclassing and overriding. | ||
| - **Java** introduced **sealed classes and interfaces**, which restrict inheritance to a fixed set of types. | ||
| - **Haskell** has long debated the problem of **orphan instances**, where typeclass implementations can appear outside the defining module, leading to conflicts and incoherence. Libraries often discourage or forbid such instances by convention. | ||
|
|
||
| These examples show that ecosystems benefit from explicit language-level controls on extension and implementation. Rust’s `permits` clause would provide a comparable, ergonomic solution tailored to Rust’s trait system. | ||
|
|
||
| ## Unresolved questions | ||
|
|
||
| Several aspects of the `permits` design remain open for discussion: | ||
|
|
||
| - **Crate identity** | ||
| Should `permits` list Cargo package names, crate names, or some stable identity? | ||
| How should renames and `extern crate` aliases be handled? | ||
|
|
||
| - **Paths and modules** | ||
| Should `permits` support finer granularity, such as submodules or subcrates, or remain crate-scoped only? | ||
|
|
||
| - **Blanket impls** | ||
| Are special diagnostics or rules needed for blanket impls (`impl<T> Trait for T`) that could broadly constrain downstream type space? | ||
|
|
||
| - **Negative impls** | ||
| Should negative impls (`impl !Trait for Type`) be restricted in the same way, and are there additional caveats? | ||
|
|
||
| - **Dependency cycles** | ||
| Does permitting multiple crates introduce any issues with cyclic dependencies or mutually permitted crates? | ||
|
|
||
| - **Re-exported traits** | ||
| If a trait is re-exported from another crate, does the `permits` clause need additional metadata to clarify permissions? | ||
|
|
||
| - **Unsafe traits** | ||
| Should unsafe traits combined with `permits` have distinct diagnostics to highlight safety boundaries? | ||
|
|
||
|
|
||
| ## Future possibilities | ||
|
|
||
| The `permits` clause could be extended or combined with other language features in the future: | ||
|
|
||
| - **Finer-grained control** | ||
| Extend `permits` to allow restrictions at the module or type level, not just crate-wide. | ||
|
|
||
| - **Conditional permits** | ||
| Integrate with Cargo features to enable or disable permitted crates based on feature flags. | ||
|
|
||
| - **Discovery tooling** | ||
| Provide compiler and IDE support to surface permitted implementors, audit logs, and cross-crate intent in documentation. | ||
|
|
||
| - **Library design guidance** | ||
| Establish best practices for introducing `permits` without disrupting ecosystems, including migration strategies and communication patterns. | ||
|
|
||
| - **Safety integration** | ||
| Combine with `unsafe trait` semantics to enforce stricter safety boundaries across crate boundaries. | ||
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
how does the upstream trait declaration knows the name of the downstream crate name provide the impls? any crate can call themselves
mycrate_extra, so this does not prevent "malicious impls" mentioned on line 21 at all