pgx 0.7.0

pgx: A Rust framework for creating Postgres extensions
Documentation
/*
Portions Copyright 2019-2021 ZomboDB, LLC.
Portions Copyright 2021-2022 Technology Concepts & Design, Inc. <support@tcdi.com>

All rights reserved.

Use of this source code is governed by the MIT license that can be found in the LICENSE file.
*/

//!
//! Provides interfacing into Postgres' `MemoryContext` system.
//!
//! The `PgBox<T>` projects Postgres-allocated memory pointers as if they're first-class Rust types.
//!
//! An enum-based interface (`PgMemoryContexts`) around Postgres' various `MemoryContext`s provides
//! simple accessibility to working with MemoryContexts in a compiler-checked manner
//!
use crate::pg_sys;
use crate::pg_sys::AsPgCStr;
use core::ptr;
use std::fmt::Debug;
use std::ptr::NonNull;

/// A shorter type name for a `*const std::os::raw::c_void`
#[allow(non_camel_case_types)]
pub type void_ptr = *const std::os::raw::c_void;

/// A shorter type name for a `*mut std::os::raw::c_void`
#[allow(non_camel_case_types)]
pub type void_mut_ptr = *mut std::os::raw::c_void;

/// An Enumeration of Postgres top-level MemoryContexts.  Each have their own use and "lifetimes"
/// as defined by Postgres' memory management model.
///
/// It's possible to deference any one of these (except `Transient`) via the `::value()` method if
/// it's necessary to pass the raw pointer to a Postgres function.
///
/// Additionally, the `::switch_to()` function, which takes a closure as its argument, executes the
/// closure within that MemoryContext
#[derive(Debug)]
pub enum PgMemoryContexts {
    /// Because it would be too much notational overhead to always pass an
    /// appropriate memory context to called routines, there always exists the
    /// notion of the current memory context CurrentMemoryContext.  Without it,
    /// for example, the copyObject routines would need to be passed a context, as
    /// would function execution routines that return a pass-by-reference
    /// datatype.  Similarly for routines that temporarily allocate space
    /// internally, but don't return it to their caller?  We certainly don't
    /// want to clutter every call in the system with "here is a context to
    /// use for any temporary memory allocation you might want to do".
    ///
    /// The upshot of that reasoning, though, is that CurrentMemoryContext should
    /// generally point at a short-lifespan context if at all possible.  During
    /// query execution it usually points to a context that gets reset after each
    /// tuple.  Only in *very* circumscribed code should it ever point at a
    /// context having greater than transaction lifespan, since doing so risks
    /// permanent memory leaks.
    CurrentMemoryContext,

    /// this is the actual top level of the context tree;
    /// every other context is a direct or indirect child of this one.  Allocating
    /// here is essentially the same as "malloc", because this context will never
    /// be reset or deleted.  This is for stuff that should live forever, or for
    /// stuff that the controlling module will take care of deleting at the
    /// appropriate time.  An example is fd.c's tables of open files.  Avoid
    /// allocating stuff here unless really necessary, and especially avoid
    /// running with CurrentMemoryContext pointing here.
    TopMemoryContext,

    /// this is not actually a separate context, but a
    /// global variable pointing to the per-portal context of the currently active
    /// execution portal.  This can be used if it's necessary to allocate storage
    /// that will live just as long as the execution of the current portal requires.
    PortalContext,

    /// this permanent context is switched into for error
    /// recovery processing, and then reset on completion of recovery.  We arrange
    /// to have a few KB of memory available in it at all times.  In this way, we
    /// can ensure that some memory is available for error recovery even if the
    /// backend has run out of memory otherwise.  This allows out-of-memory to be
    /// treated as a normal ERROR condition, not a FATAL error.
    ErrorContext,

    /// this is the postmaster's normal working context.
    /// After a backend is spawned, it can delete PostmasterContext to free its
    /// copy of memory the postmaster was using that it doesn't need.
    /// Note that in non-EXEC_BACKEND builds, the postmaster's copy of pg_hba.conf
    /// and pg_ident.conf data is used directly during authentication in backend
    /// processes; so backends can't delete PostmasterContext until that's done.
    /// (The postmaster has only TopMemoryContext, PostmasterContext, and
    /// ErrorContext --- the remaining top-level contexts are set up in each
    /// backend during startup.)
    PostmasterContext,

    /// permanent storage for relcache, catcache, and
    /// related modules.  This will never be reset or deleted, either, so it's
    /// not truly necessary to distinguish it from TopMemoryContext.  But it
    /// seems worthwhile to maintain the distinction for debugging purposes.
    /// (Note: CacheMemoryContext has child contexts with shorter lifespans.
    /// For example, a child context is the best place to keep the subsidiary
    /// storage associated with a relcache entry; that way we can free rule
    /// parsetrees and so forth easily, without having to depend on constructing
    /// a reliable version of freeObject().)
    CacheMemoryContext,

    /// this context holds the current command message from the
    /// frontend, as well as any derived storage that need only live as long as
    /// the current message (for example, in simple-Query mode the parse and plan
    /// trees can live here).  This context will be reset, and any children
    /// deleted, at the top of each cycle of the outer loop of PostgresMain.  This
    /// is kept separate from per-transaction and per-portal contexts because a
    /// query string might need to live either a longer or shorter time than any
    /// single transaction or portal.
    MessageContext,

    /// this holds everything that lives until end of the
    /// top-level transaction.  This context will be reset, and all its children
    /// deleted, at conclusion of each top-level transaction cycle.  In most cases
    /// you don't want to allocate stuff directly here, but in CurTransactionContext;
    /// what does belong here is control information that exists explicitly to manage
    /// status across multiple subtransactions.  Note: this context is NOT cleared
    /// immediately upon error; its contents will survive until the transaction block
    /// is exited by COMMIT/ROLLBACK.
    TopTransactionContext,

    /// this holds data that has to survive until the end
    /// of the current transaction, and in particular will be needed at top-level
    /// transaction commit.  When we are in a top-level transaction this is the same
    /// as TopTransactionContext, but in subtransactions it points to a child context.
    /// It is important to understand that if a subtransaction aborts, its
    /// CurTransactionContext is thrown away after finishing the abort processing;
    /// but a committed subtransaction's CurTransactionContext is kept until top-level
    /// commit (unless of course one of the intermediate levels of subtransaction
    /// aborts).  This ensures that we do not keep data from a failed subtransaction
    /// longer than necessary.  Because of this behavior, you must be careful to clean
    /// up properly during subtransaction abort --- the subtransaction's state must be
    /// delinked from any pointers or lists kept in upper transactions, or you will
    /// have dangling pointers leading to a crash at top-level commit.  An example of
    /// data kept here is pending NOTIFY messages, which are sent at top-level commit,
    /// but only if the generating subtransaction did not abort.
    CurTransactionContext,

    /// This represents a MemoryContext that was likely created via
    /// [pg_sys::AllocSetContextCreateExtended].
    ///
    /// That could be a MemoryContext you created yourself, or it could be one given to you from
    /// Postgres.  For example, the `TupleTableSlot` struct has a field referencing the MemoryContext
    /// in which slots are allocated.
    For(pg_sys::MemoryContext),

    /// A MemoryContext owned by Rust that will be freed when when Dropped
    Owned(OwnedMemoryContext),

    /// Use the MemoryContext in which the specified pointer was allocated.
    ///
    /// It's incredibly important that the specified pointer be one actually allocated by
    /// Postgres' memory management system.  Otherwise, it's undefined behavior and will
    /// **absolutely** crash Postgres
    Of(OwnerMemoryContext),

    /// Create a temporary MemoryContext for use with `::switch_to()`.  It gets deleted as soon
    /// as `::switch_to()` exits.
    ///
    /// Trying to use this context through [::value{}] will result in a panic!().
    Transient {
        parent: pg_sys::MemoryContext,
        name: &'static str,
        min_context_size: u32,
        initial_block_size: u32,
        max_block_size: u32,
    },
}

/// A `pg_sys::MemoryContext` that is owned by `PgMemoryContexts::Owned`
#[derive(Debug)]
pub struct OwnedMemoryContext {
    owned: pg_sys::MemoryContext,
    previous: pg_sys::MemoryContext,
}

impl Drop for OwnedMemoryContext {
    fn drop(&mut self) {
        unsafe {
            // In order to prevent crashes, if we're trying to drop
            // a context that is current, switch to its predecessor, and then drop it
            if ptr::eq(pg_sys::CurrentMemoryContext, self.owned) {
                pg_sys::CurrentMemoryContext = self.previous;
            }
            pg_sys::MemoryContextDelete(self.owned);
        }
    }
}

/// A `pg_sys::MemoryContext` that allocated a specific pointer
#[derive(Debug, Clone, Copy)]
pub struct OwnerMemoryContext {
    memcxt: NonNull<pg_sys::MemoryContextData>,
}

impl PgMemoryContexts {
    /// Create a new `PgMemoryContext::Owned`
    pub fn new(name: &str) -> PgMemoryContexts {
        let previous = PgMemoryContexts::CurrentMemoryContext.value();
        PgMemoryContexts::Owned(OwnedMemoryContext {
            previous,
            owned: unsafe {
                pg_sys::AllocSetContextCreateExtended(
                    PgMemoryContexts::CurrentMemoryContext.value(),
                    name.as_pg_cstr(),
                    pg_sys::ALLOCSET_DEFAULT_MINSIZE as usize,
                    pg_sys::ALLOCSET_DEFAULT_INITSIZE as usize,
                    pg_sys::ALLOCSET_DEFAULT_MAXSIZE as usize,
                )
            },
        })
    }

    /// Create a [`PgMemoryContexts::Of`] variant that wraps the [`pg_sys::MemoryContext`] that owns
    /// the specified pointer.
    ///
    /// Note that the specified pointer **must** be allocated by Postgres, via [`pg_sys::palloc`] or
    /// similar functions.
    ///
    /// Returns [`Option::None`] if the specified pointer is null.
    ///
    /// # Safety
    ///
    /// This function is incredibly unsafe.  If the specified pointer is not one originally allocated
    /// by Postgres, there is absolutely no telling what will be returned.
    ///
    /// Furthermore, users of this function's return value have no choice but to assume the returned
    /// [`PgMemoryContexts::Of`] variant represents a legitimate [`pg_sys::MemoryContext`].
    pub unsafe fn of(ptr: void_mut_ptr) -> Option<PgMemoryContexts> {
        let parent = unsafe {
            // (un)SAFETY: the caller assumes responsibility for ensuring the provided pointer is
            // going to be accepted by Postgres `GetMemoryContextChunk`.  Postgres will ERROR
            // if its invariants aren't met, but who really knows when the ptr could have come
            // come from anywhere
            pg_sys::GetMemoryContextChunk(ptr)
        };
        let memcxt = NonNull::new(parent)?;
        Some(PgMemoryContexts::Of(OwnerMemoryContext { memcxt }))
    }

    /// Retrieve the underlying Postgres `*mut MemoryContextData`
    ///
    /// This works for every type except the `::Transient` type.
    pub fn value(&self) -> pg_sys::MemoryContext {
        match self {
            PgMemoryContexts::CurrentMemoryContext => unsafe { pg_sys::CurrentMemoryContext },
            PgMemoryContexts::TopMemoryContext => unsafe { pg_sys::TopMemoryContext },
            PgMemoryContexts::PortalContext => unsafe { pg_sys::PortalContext },
            PgMemoryContexts::ErrorContext => unsafe { pg_sys::ErrorContext },
            PgMemoryContexts::PostmasterContext => unsafe { pg_sys::PostmasterContext },
            PgMemoryContexts::CacheMemoryContext => unsafe { pg_sys::CacheMemoryContext },
            PgMemoryContexts::MessageContext => unsafe { pg_sys::MessageContext },
            PgMemoryContexts::TopTransactionContext => unsafe { pg_sys::TopTransactionContext },
            PgMemoryContexts::CurTransactionContext => unsafe { pg_sys::CurTransactionContext },
            PgMemoryContexts::For(mc) => *mc,
            PgMemoryContexts::Owned(mc) => mc.owned,
            PgMemoryContexts::Of(owner) => owner.memcxt.as_ptr(),
            PgMemoryContexts::Transient { .. } => {
                panic!("cannot use value() to retrieve a Transient PgMemoryContext")
            }
        }
    }

    /// Set this MemoryContext as the `CurrentMemoryContext, returning whatever `CurrentMemoryContext` is
    pub fn set_as_current(&mut self) -> PgMemoryContexts {
        unsafe {
            let old_context = pg_sys::CurrentMemoryContext;

            match self {
                PgMemoryContexts::Owned(mc) => {
                    // If the context is set as current while it's already current,
                    // don't update `previous` as it'll self-reference instead.
                    if old_context != mc.owned {
                        mc.previous = old_context;
                    }
                }
                _ => {}
            }

            pg_sys::CurrentMemoryContext = self.value();

            PgMemoryContexts::For(old_context)
        }
    }

    /// Release all space allocated within a context (ie, free the memory) and delete all its
    /// descendant contexts (but not the context itself).
    ///
    /// # Safety
    ///
    /// This function is unsafe as it can easily lead to use-after-free of Postgres allocated
    /// memory:
    ///
    /// ```rust,no_run
    /// use pgx::memcxt::PgMemoryContexts;
    /// struct Thing(Option<String>);
    /// let mut thing = unsafe {
    ///     // SAFETY:  CurrentMemoryContext is always valid and Thing can be allocated as a zero'd struct
    ///     PgMemoryContexts::CurrentMemoryContext.palloc0_struct::<Thing>()
    /// };
    /// let mut thing = unsafe {
    ///     // SAFETY:  We just allocated it, so it must be a valid Thing
    ///     thing.as_mut().unwrap()
    /// };
    /// thing.0 = Some("hello, world".into());
    ///
    /// unsafe {
    ///     // SAFETY:  We promise not to use anything allocated by CurrentMemoryContext prior to
    ///     // this call to reset(), specifically `thing`.
    ///     PgMemoryContexts::CurrentMemoryContext.reset();
    /// }
    ///
    /// assert_eq!(thing.0, Some("hello, world".into()))  // we lied! UAF happens here
    /// ```
    pub unsafe fn reset(&mut self) {
        unsafe {
            pg_sys::MemoryContextReset(self.value());
        }
    }

    /// Returns parent memory context if any
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    pub unsafe fn parent(&self) -> Option<PgMemoryContexts> {
        // SAFETY: We do this instead of simply plucking the .parent field ourselves
        // mostly to let Postgres check the context validity if --enable-cassert is on
        let parent = unsafe { pg_sys::MemoryContextGetParent(self.value()) };
        if parent.is_null() {
            None
        } else {
            Some(PgMemoryContexts::For(parent))
        }
    }

    /// Run the specified function "within" the `MemoryContext` represented by this enum.
    ///
    /// The important implementation detail is that Postgres' `CurrentMemoryContext` is changed
    /// to be this context, the function is run so that all Postgres memory allocations happen
    /// within that context, and then `CurrentMemoryContext` is restored to what it was before
    /// we started.
    ///
    /// ## Examples
    ///
    /// ```rust,no_run
    /// use pgx::prelude::*;
    /// use pgx::PgMemoryContexts;
    ///
    /// pub fn do_something() -> pg_sys::ItemPointer {
    ///     unsafe {
    ///     // SAFETY:  We know for a fact that `PgMemoryContexts::TopTransactionContext` is always valid
    ///     PgMemoryContexts::TopTransactionContext.switch_to(|context| {
    ///         // allocate a new ItemPointerData, but inside the TopTransactionContext
    ///         let tid = PgBox::<pg_sys::ItemPointerData>::alloc();
    ///
    ///         // do something with the tid and then return it.
    ///         // Note that it stays allocated here in the TopTransactionContext
    ///         tid.into_pg()
    ///     })
    ///     }
    /// }
    /// ```
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn switch_to<R, F: FnOnce(&mut PgMemoryContexts) -> R>(&mut self, f: F) -> R {
        match self {
            PgMemoryContexts::Transient {
                parent,
                name,
                min_context_size,
                initial_block_size,
                max_block_size,
            } => {
                let context: pg_sys::MemoryContext = unsafe {
                    let name = std::ffi::CString::new(*name).unwrap();
                    pg_sys::AllocSetContextCreateExtended(
                        *parent,
                        name.into_raw(),
                        *min_context_size as usize,
                        *initial_block_size as usize,
                        *max_block_size as usize,
                    )
                };

                let result = PgMemoryContexts::exec_in_context(context, f);

                unsafe {
                    pg_sys::MemoryContextDelete(context);
                }

                result
            }
            _ => PgMemoryContexts::exec_in_context(self.value(), f),
        }
    }

    /// Duplicate a Rust `&str` into a Postgres-allocated "char *"
    ///
    /// ## Examples
    ///
    /// ```rust,no_run
    /// use pgx::PgMemoryContexts;
    /// // SAFETY:  `CurrentMemoryContext` is always valid, and we promise not to use `copy` after
    /// // `CurrentMemoryContext` has been free'd.
    /// let copy = unsafe { PgMemoryContexts::CurrentMemoryContext.pstrdup("make a copy of this") };
    /// ```
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn pstrdup(&self, s: &str) -> *mut std::os::raw::c_char {
        let cstring = std::ffi::CString::new(s).unwrap();
        unsafe { pg_sys::MemoryContextStrdup(self.value(), cstring.as_ptr()) }
    }

    /// Copies `len` bytes, starting at `src` into this memory context and
    /// returns a raw `*mut T` pointer to the newly allocated location
    ///
    /// # Panics
    ///
    /// This function will panic if `src` is a null pointer.
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    #[warn(unsafe_op_in_unsafe_fn)]
    pub unsafe fn copy_ptr_into<T>(&mut self, src: *mut T, len: usize) -> *mut T {
        if src.is_null() {
            panic!("attempt to copy a null pointer");
        }

        // SAFETY: We alloc new space, it should be non-overlapping!
        unsafe {
            // Make sure we copy bytes.
            let dest = pg_sys::MemoryContextAlloc(self.value(), len).cast::<u8>();
            ptr::copy_nonoverlapping(src.cast(), dest, len);
            dest.cast()
        }
    }

    /// Allocate memory in this context, which will be free'd whenever Postgres deletes this MemoryContext
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn palloc(&mut self, len: usize) -> *mut std::os::raw::c_void {
        unsafe { pg_sys::MemoryContextAlloc(self.value(), len) }
    }

    /// Allocate a struct in this memory context, returning a pointer to it.  The memory will be
    /// uninitialized and will be freed whenever Postgres deletes this MemoryContext.
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn palloc_struct<T>(&mut self) -> *mut T {
        unsafe { self.palloc(std::mem::size_of::<T>()) as *mut T }
    }

    /// Allocate a struct in this memory context, returning a pointer to it.  The memory will be
    /// zeroed and will be freed whenever Postgres deletes this MemoryContext.
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn palloc0_struct<T>(&mut self) -> *mut T {
        unsafe { self.palloc0(std::mem::size_of::<T>()) as *mut T }
    }

    /// Allocate a slice in this context, which will be free'd whenever Postgres deletes this MemoryContext
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn palloc_slice<'a, T>(&mut self, len: usize) -> &'a mut [T] {
        unsafe {
            let buffer = self.palloc(std::mem::size_of::<T>() * len) as *mut T;
            std::slice::from_raw_parts_mut(buffer, len)
        }
    }

    /// Allocate a slice in this context, where the memory is zero'd, which will be free'd whenever Postgres deletes this MemoryContext
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn palloc0_slice<'a, T>(&mut self, len: usize) -> &'a mut [T] {
        unsafe {
            let buffer = self.palloc0(std::mem::size_of::<T>() * len) as *mut T;
            std::slice::from_raw_parts_mut(buffer, len)
        }
    }

    /// Allocate memory in this context, which will be free'd whenever Postgres deletes this MemoryContext
    ///
    /// The allocated memory is zero'd
    ///
    /// # Safety
    ///
    /// This function is unsafe because we cannot ensure that any of the [`PgMemoryContexts`] variants,
    /// specifically those with payloads, actually represent valid Postgres [`pg_sys::MemoryContextData`]
    /// pointers.
    ///
    /// We also cannot ensure that the result of this function will stay allocated as long as Rust's
    /// borrow checker thinks it will.
    pub unsafe fn palloc0(&mut self, len: usize) -> *mut std::os::raw::c_void {
        unsafe { pg_sys::MemoryContextAllocZero(self.value(), len) }
    }

    /// Consumes an instance of `T` and leaks it.  Whenever Postgres deletes
    /// this MemoryContext, the original instance of `T` will be resurrected and its `impl Drop`
    /// will be called.
    pub fn leak_and_drop_on_delete<T>(&mut self, v: T) -> *mut T {
        unsafe extern "C" fn drop_on_delete<T>(ptr: void_mut_ptr) {
            let boxed = Box::from_raw(ptr as *mut T);
            drop(boxed);
        }

        let leaked_ptr = Box::leak(Box::new(v));
        unsafe {
            // SAFETY:  we know the result of `self.palloc_struct()` is a valid pointer and its
            // okay that it's uninitialized because its fields are just pointers and we set them
            // immediately after
            let callback = self.palloc_struct::<pg_sys::MemoryContextCallback>();
            (*callback).func = Some(drop_on_delete::<T>);
            (*callback).arg = leaked_ptr as *mut T as void_mut_ptr;

            pg_sys::MemoryContextRegisterResetCallback(self.value(), callback);
        }
        leaked_ptr
    }

    /// Allocates and then leaks a "trivially dropped" type in the appropriate memory context.
    /// If `feature = "postgrestd"` is enabled, this "forgets" it entirely, assuming that it is fine
    /// to let Postgres `pfree` it later. Otherwise it is equivalent to `fn leak_and_drop_on_delete`.
    ///
    /// Accordingly, this may prove unwise to use on something that actually needs to run its Drop.
    /// But note it is not actually unsound to `mem::forget` something in this way, just annoying
    /// if you were expecting it to actually execute its Drop.
    pub fn leak_trivial_alloc<T>(&mut self, v: T) -> *mut T {
        #[cfg(feature = "postgrestd")]
        {
            Box::leak(Box::new(v))
        }
        #[cfg(not(feature = "postgrestd"))]
        {
            self.leak_and_drop_on_delete(v)
        }
    }

    /// helper function
    fn exec_in_context<R, F: FnOnce(&mut PgMemoryContexts) -> R>(
        context: pg_sys::MemoryContext,
        f: F,
    ) -> R {
        let prev_context;

        // mimic what palloc.h does for switching memory contexts
        unsafe {
            prev_context = pg_sys::CurrentMemoryContext;
            pg_sys::CurrentMemoryContext = context;
        }

        let result = f(&mut PgMemoryContexts::For(context));
        // restore our understanding of the current memory context
        unsafe {
            pg_sys::CurrentMemoryContext = prev_context;
        }

        result
    }
}