snafu VS unsafe-code-guidelines

Compare snafu vs unsafe-code-guidelines and see what are their differences.

snafu

Easily assign underlying errors into domain-specific errors while adding context (by shepmaster)

unsafe-code-guidelines

Forum for discussion about what unsafe code can and can't do (by rust-lang)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
snafu unsafe-code-guidelines
2 74
1,285 641
- 1.4%
8.0 6.9
30 days ago about 2 months ago
Rust
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

snafu

Posts with mentions or reviews of snafu. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-09.
  • Modular Errors in Rust
    3 projects | news.ycombinator.com | 9 Apr 2023
    I encourage people to check out my SNAFU crate [1]. I encourage creating many distinct error types (usually enums but also structs) and composing them. So much so that I advocate that you never create one specific error in more than one source location. That means that the collection of error types produces a unique trace through your program, uniquely identifying the source of the error with no runtime cost (compare this to a runtime-collected stacktrace / backtrace).

    [1]: https://docs.rs/snafu/

  • Announcing Rust 1.58.0
    2 projects | /r/programming | 14 Jan 2022
    Yes, all procedural macros are inherently unhygienic. This has even bitten us once before.

unsafe-code-guidelines

Posts with mentions or reviews of unsafe-code-guidelines. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-16.
  • Passing nothing is surprisingly difficult
    2 projects | news.ycombinator.com | 16 Jan 2024
    Useful context on the Rust side is this issue [1]. It sounds like some of the author's concerns are addressed already.

    [1]: https://github.com/rust-lang/unsafe-code-guidelines/issues/4...

  • Blog Post: Non-Send Futures When?
    2 projects | /r/rust | 10 Dec 2023
    Is this captured by one of the known soundness conflicts? If not then should consider adding it to the list.
  • Are crates like vcell and volatile cell still unsound?
    1 project | /r/rust | 5 Jun 2023
  • Question: Are there things for Unsafe Rust learn from Zig?
    2 projects | /r/rust | 1 Jun 2023
    There are some competing proposals for different memory models. Stacked borrows is the current proposal, but there are more work in the approproate WG.
  • Let's thank who have helped us in the Rust Community together!
    9 projects | /r/rust | 28 May 2023
    Thank you /u/RalfJung for bringing formal methods to Rust, both through models like Stacked Borrows, by developing miri, and by working on unsafe-code-guidelines which aims to specify exactly what is and isn't allowed in unsafe code (surprisingly, it's an open question as 2023!)
  • Questions about ownership rule
    2 projects | /r/rust | 23 May 2023
  • Noob Here: Why doesn't this work?
    1 project | /r/rust | 16 Apr 2023
    You could imagine some way to make this safe for example automatically convert &'short &'long mut T to &'short &'short T, but it's non-trivial to prove they are safe at all, not to mention ensuring this is correctly implemented in the compiler. If you're interested there's also a discussion on whether the opposite (& & T to & &mut T) is sound here.
  • When Zig is safer and faster than (unsafe) Rust
    3 projects | /r/rust | 7 Mar 2023
    Agreed! MIRI is so good, it still feels like magic to me. It also comforts me that the Rust team takes improving unsafe semantics seriously, with the past Unsafe Code Guidelines WG and today's operational semantics team (t-opsem).
  • Safety and Soundness in Rust
    5 projects | news.ycombinator.com | 5 Mar 2023
    I think there are some aspects of this rule that are still undecided. See for example:

    - https://github.com/rust-lang/unsafe-code-guidelines/issues/8...

    - https://github.com/rust-lang/miri/issues/2732

  • I wanna be a crab.
    16 projects | /r/rust | 27 Feb 2023
    C is much better specified than unsafe Rust. Some things are just not worked out yet in Rust. This may sometimes even bite very experienced devs, such as this issue with Box's aliasing semantics, which tripped up the author of left-right.

What are some alternatives?

When comparing snafu and unsafe-code-guidelines you can also consider the following projects:

rust - Empowering everyone to build reliable and efficient software.

tokio - A runtime for writing reliable asynchronous applications with Rust. Provides I/O, networking, scheduling, timers, ...

miette - Fancy extension for std::error::Error with pretty, detailed diagnostic printing.

enum-code - derive(Code) simplifies error handling by providing an easy-to-use enumeration of error codes

rfcs - RFCs for changes to Rust

deno - A modern runtime for JavaScript and TypeScript.

x11rb - X11 bindings for the rust programming language, similar to xcb being the X11 C bindings

gust - Built in Rust and leveraging Docker, JSON, and SQLite (with future integration of a GraphQL API), 'gust' simplifies the process of preserving your recipes and creating comprehensive grocery shopping lists.

bevy - A refreshingly simple data-driven game engine built in Rust

miri - An interpreter for Rust's mid-level intermediate representation

nomicon - The Dark Arts of Advanced and Unsafe Rust Programming