Associated type(s) on Component
which can be used to restrict access to operations. Operations allowed as normal if it's ()
, but if it's something else a value of this type should be passed in.
&mut
from a Mut<'_, T>
requires providing a value of <T as Component>::MutPerm
&mut
to a component should be gated, I can't think of anything that doesnt go through a Mut<T>
thoughT: Component<MutPerm = ()>
instead of just T: Component
if it wanted to mutate the componentInsertPerm = ()
then users can insert a new T
over the existing component on an entity which is effectively the same as mutating and would bypass MutPerm
. Every use case of MutPerm
will likely also want to set InsertPerm
or add a hook for on_insert
so this seems like a footgunIndexes would like to be able to prevent people from mutating components without updating the index. With permissions a crate author can set the MutPerm
to a type that only they can create. This would allow building API that statically ensures the index is updated after mutation:
index_resource: ResMut<Index<T>>; // from system param
val: Mut<T>; // from query
index_resource.access_mutably(val, |val: &mut T| {
/* ... */
});
A MutPerm
here is not enough as users could .insert::<T>
over an existing component of type T
so we would have to either add an InsertPerm
or setup an on_insert
hook.
For parent/child hierarchy (or rather general forms of hierarchy / entity relations) we often want to disallow people from mutating the entity in struct Parent(Entity)
or the list of children in struct Children(Vec<Entity>)
If users could write *parent = *other_parent
they could leave the hierarchy in an invalid state where Parent
and Children
components disagree on the shape of the hierarchy.
To solve this we want to set MutPerm
to some internal type that users cannot create so that we can ensure that the components are only mutated by bevy inside of dedicated commands for mutating the hierarchy.
world.insert()
requires providing a value of <T as Component>::InsertPerm
(same is true of Commands
and EntityMut
)
.spawn_bundle_with_perm(MyBundle(..), ((), (), (), (), (), MyInsertPerm))
where MyBundle
contains a bunch of components with only one that requires an Insert
permPermed<T: Bundle>
type which implements Bundle
and has an InsertPerm
of ()
()
insert permsMyBundle
could instead be written like: .spawn_bundle_with_perm(MyBundle(.., Permed::new(_, MyInsertPerm)))
T: Component<InsertPerm = ()>
instead of just T: Component
if it wanted to insert the component on an entityMutPerm
is insufficient on its own to detect all mutations of a component as users could insert over an existing component. InsertPerm
is a solution to this problem (another being on_insert
hooks)
world.remove()
requires providing a value of <T as Component>::RemovePerm
(same is true of Commands
and EntityMut
)
T: Component<RemovePerm = ()>
instead of just T: Component
if it wanted to remove the component from an entityHaven't come up with a solid use case here but it seems logical to have if we also have InsertPerm
and MutPerm
Functions on Component
which get called after the relevant operation
fn on_insert(Entity, &mut World)
fn on_remove(&mut self, Entity, &mut World)
EntityMut::remove
returns the removed value.fn on_remove_from_despawn(&mut self, Entity, &mut World)
on_insert
allows us to let child.insert::<ChildOf>(ChildOf(parent))
work "correctly", automatically adding child
to the parent's Children
component (adding the component if required). It could also be used for inserting the other edge of the relation, parent.insert::<ParentOf>(ParentOf(vec![child1, child2, child3]))
automatically adding ChildOf(parent)
to all the children entities.
on_remove
allows us to handle child.remove::<ChildOf>()
, automatically removing the entity from the parent entity's Children
component. Can also be used for parent.remove::<Children>()
automatically removing the ChildOf
component from all entities in the Children
component.
on_remove_from_despawn
allows .despawn()
to correctly dispose of a parent/child hierarchy instead of requiring a custom .despawn_recursive
command.
Bundle operations such as insert
or remove
happen all at once and hooks will run after the operation has completed, a subtle interaction here is that hooks are able to observe broken invariants as hooks for other components in the bundle may not have been run yet i.e.: commands.spawn_bundle((A, Children(...)))
, if A
has a hook it would be able to observe a Children
component where the entities do not have the required ChildOf
component.
I(Boxy) do not think we should have Insert
or Remove
perms. Adding perms makes generic code more annoying to write because you have to add an assoc type equality bound (T: Component<MutPerm = (), InsertPerm = (), RemovePerm = ()>
). Hooks cannot replace the functionality of MutPerm
and the value of it is high enough that I think this tradeoff is worthwhile. InsertPerm
and RemovePerm
on the other hand, hooks can replace the functionality while also allowing APIs to be more consistent with the rest of bevy_ecs (i.e. hooks will allow us to use parent.remove::<Children>()
instead of creating a custom command for the remove operation parent.remove_children()
). For this reason insert
/remove
permissions should not be added, instead hooks should be used.
It is a little bit sus that hooks would allow a .remove::<T>
command to effectively run "arbitrary" logic, permissions would require a custom command which more accurately represents what logic the command will end up running.
TakePerm and more hooks so we can have an on_remove that takes self and a on_take that takes &mut self
^ needs use case
abandon hooks in favor of relying on Perms and Commands
would still need on_remove_from_despawn at a minimum, but drastically simpler to reason about what could happen
Batched operations now run hooks after the batch is completed
pros: batched hooks
cons: need to store the entities somewhere, more complicated to think about
(UNCERTAIN) fn on_mutate(...?)