-
Notifications
You must be signed in to change notification settings - Fork 13.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tracking Issue for slice::array_chunks #74985
Comments
Add `slice::array_chunks_mut` This follows `array_chunks` from rust-lang#74373 with a mutable version, `array_chunks_mut`. The implementation is identical apart from mutability. The new tests are adaptations of the `chunks_exact_mut` tests, plus an inference test like the one for `array_chunks`. I reused the unstable feature `array_chunks` and tracking issue rust-lang#74985, but I can separate that if desired. r? `@withoutboats` cc `@lcnr`
Add array_windows fn This mimicks the functionality added by array_chunks, and implements a const-generic form of `windows`. It makes egregious use of `unsafe`, but by necessity because the array must be re-interpreted as a slice of arrays, and unlike array_chunks this cannot be done by casting the original array once, since each time the index is advanced it needs to move one element, not `N`. I'm planning on adding more tests, but this should be good enough as a premise for the functionality. Notably: should there be more functions overwritten for the iterator implementation/in general? ~~I've marked the issue as rust-lang#74985 as there is no corresponding exact issue for `array_windows`, but it's based of off `array_chunks`.~~ Edit: See Issue rust-lang#75027 created by @lcnr for tracking issue ~~Do not merge until I add more tests, please.~~ r? @lcnr
…lbertodt Add [T]::as_chunks(_mut) Allows getting the slices directly, rather than just through an iterator as in `array_chunks(_mut)`. The constructors for those iterators are then written in terms of these methods, so the iterator constructors no longer have any `unsafe` of their own. Unstable, of course. rust-lang#74985
Is there any intention of providing the reverse versions of these functions? |
What would that look like? |
Same API, but iterating backwards. I have a use case in which I need to convert either a prefix or a suffix of a slice to an array reference. This API is perfect for the prefix use case, and I'd love to be able to use it for the suffix use case as well. |
@joshlf |
That's only true if |
Ah, I misunderstood your use case, you want |
Yep, exactly 😃 |
Yeah, array_rchunks is definitely worth having. |
Also useful would be the inverse operation: |
Do we need to wait until |
Hi, is there any alternatives before this is stable? Thanks! |
Yeah |
Thanks! |
That is certainly true in the vacuum. My story gives some perspective on what happens if it becomes a common pattern. The thing is, in that example all relevant values were hard-coded. If they were wrong they'd also always panic. But the issue is we got used to those conversions being the standard so much that a wrong conversion looked like the right one. To map it to this method, one way this could go wrong is if people indeed started using |
I thought the current policy was to always do FCP on the stabilization PR, not the tracking issue? In this case, I think const-stabilizing these functions will require const-stabilizing an intrinsic ( |
It was reconsidered in the last libs-api meeting and decided that if that were to be changed, other related changes would need to be made to facilitate it, such as moving the discussions off of the tracking issues (or some other solution) so that the conversations would not be split between the tracking issue and the stabilization PR. It was mentioned that libs-api had previously done the FCP on the stabilization PR and that the experience was considered to have been a failure, leading to the process of doing it on the tracking issue. So the reasons behind the previous experience of failure with the process need to be explored and the causes resolved. The divergence in experience is quite interesting, as on the lang side we've found doing the stabilization FCP on the stabilization PR to be a significant process improvement.
Agreed. Similarly, apropos of @scottmcm's question, doing it on the stabilization PR helps to make the exact scope of the stabilization more clear. |
On this matter, of course, whoever is handling the stabilization, please put up a PR to stabilize the intrinsics and lang-nominate that. We could make our FCP contingent on libs-api deciding to stabilize the functions here so the FCPs could run in parallel. |
@rust-lang/libs-api it would be really good to get clarity on what exact set of functions and types is being proposed for stabilization here, as currently it is unclear. |
I put up and FCP for |
Yeah that is somewhat surprising. In particular with const stabilization, it can be hard to predict what exactly needs to be stabilized for this to work, such as extra intrinsics or some use of |
It wasn't discussed in the detail in the meeting, we mostly focused on the |
@rfcbot cancel |
@Amanieu proposal cancelled. |
In the @rust-lang/libs-api meeting today we discussed the specific methods that we are considering stabilizing. We decided to only stabilize the Methods being stabilized are: impl [T] {
const fn as_chunks<const N: usize>(&self) -> (&[[T; N]], &[T]);
const fn as_rchunks<const N: usize>(&self) -> (&[T], &[[T; N]]);
const unsafe fn as_chunks_unchecked<const N: usize>(&self) -> &[[T; N]];
const fn as_chunks_mut<const N: usize>(&mut self) -> (&mut [[T; N]], &mut [T]);
const fn as_rchunks_mut<const N: usize>(&mut self) -> (&mut [T], &mut [[T; N]]);
const unsafe fn as_chunks_unchecked_mut<const N: usize>(&mut self) -> &mut [[T; N]];
} @rfcbot merge |
Team member @Amanieu has proposed to merge this. The next step is review by the rest of the tagged team members: No concerns currently listed. Once a majority of reviewers approve (and at most 2 approvals are outstanding), this will enter its final comment period. If you spot a major issue that hasn't been raised at any point in this process, please speak up! See this document for info about what commands tagged team members can give me. |
The docs for these functions currently state:
That should probably get fixed before stabilization or as part of stabilization. |
🔔 This is now entering its final comment period, as per the review above. 🔔 |
Couldn't we also remove the panic for these methods and return the entire slice as remainder if |
That's possible, but this statement in the docs would have to make an exception on the "strictly less" part:
|
We could do lots of things, but the big question is whether the alternatives are more useful than they are surprising. Like #74985 (comment) discussed another option above. In general, I think its good when we panic because something cannot meet the natural post-condition. It's always possible to expand a post-condition to make a panic unnecessary, but that has its own problems when the programmer ends up trying to figure out why something so weird is happening in an edge case rather than getting a really obvious failure from the «sorry, I cannot do that» panic. Does someone calling It's like how we could say that |
I'd like to note that my request for explaining why take the less conservative approach and which real-world code needs to check To put it differently, I don't have a problem with panics if some code actually needs them but I highly doubt there is any such production code. A single example would convince me that panic is better. |
I didn't think about the length of the slice being the (mathematically undefined) dividend – I guess my mind got these methods mixed up with |
I personally didn't respond because to me, examples aren't what convinces me to prefer panics. Post-mono errors are what convinces me to prefer panics. (Because I think post-mono errors should be avoided at almost all costs.) |
I'll just second this point, actually, because I think it's a good one. I used to write
A really interesting (but slightly off-topic) thing this makes me think about: Okasaki chapter 9 is about numerical representations, and the equivalence between a way of writing a number and a container of that length. The simplest example is that a linked list is a unary representation of its own length. The book does a neat job of extending that to other things too, like what the container equivalent of a binary number would be -- and how the So from that perspective, |
This is getting very off-topic, but this equivalence is what I found so incredibly fascinating about lambda calculus. It's taught me that data is defined by how you interact with it – and these interactions are basically nothing but folds. |
The feature gate for the issue is
#![feature(array_chunks)]
.Also tracks
as_(r)chunks(_mut)
in#![feature(slice_as_chunks)]
.About tracking issues
Tracking issues are used to record the overall progress of implementation.
They are also uses as hubs connecting to other relevant issues, e.g., bugs or open design questions.
A tracking issue is however not meant for large scale discussion, questions, or bug reports about a feature.
Instead, open a dedicated issue for the specific matter and add the relevant feature gate label.
Steps
RestrictMakeN
to values greater than 0 at compile time instead of using a runtime panic.<[T]>::array_*
methods fail to compile on 0 len arrays #99471N == 0
is unreachable due to conditionals Tracking Issue for slice::array_chunks #74985 (comment)Unresolved Questions
[T]::array_chunks
really need to be an iterator? #76354Implementation history
slice::array_chunks
to std #74373slice::array_chunks_mut
#75021as_chunks{_mut}
in Add [T]::as_chunks(_mut) #76635as_rchunks{_mut}
and unchecked versions in Addas_rchunks
(and friends) to slices #78818as_(r)chunk
in constifyslice_as_chunks
(unstable) #111453The text was updated successfully, but these errors were encountered: