Macros§
- Pattern that matches an unknown
DirentType
member. - Pattern that matches an unknown
ExtendedAttributeValue
member. - Pattern that matches an unknown
HashAlgorithm
member. - Pattern that matches an unknown
Representation
member. - Pattern that matches an unknown
SelinuxContext
member.
Structs§
- A Stream of incoming requests for fuchsia.io/AdvisoryLocking.
- A Stream of incoming requests for fuchsia.io/Directory.
- A Stream of incoming requests for fuchsia.io/DirectoryWatcher.
- Used in places where empty structs are needed, such as empty union members, to avoid creating new struct types.
- A Stream of incoming requests for fuchsia.io/ExtendedAttributeIterator.
- Auxiliary data for the file representation of a node.
- A Stream of incoming requests for fuchsia.io/File.
- Flags used to specify how a node should be opened. Note that ranges of bits are reserved for specific use cases:
- A Stream of incoming requests for fuchsia.io/Linkable.
- The fields of ‘attributes’ which are used to update the Node are indicated by the ‘flags’ argument.
- NodeAttributes defines generic information about a filesystem node.
- A node may have multiple supported representations when opening, even though it may have a fixed underlying identity.
- A Stream of incoming requests for fuchsia.io/Node.
- DEPRECATED - Use Flags instead.
- Options which can be used with Open3. Unlike
Flags
, these options are designed for specific use cases (e.g. to reduce round-trip latency when requesting attributes). - A Stream of incoming requests for fuchsia.io/Readable.
- A Stream of incoming requests for fuchsia.io/Symlink.
- Set of options used to enable verity on a file.
- A Stream of incoming requests for fuchsia.io/Writable.
Enums§
- Advisory locking protocol.
- Directory defines a node which is capable of containing other Objects.
- DirectoryWatcher transmits messages from a filesystem server about events happening in the filesystem. Clients can register new watchers using the
Directory.Watch
method, where they can filter which events they want to receive notifications for. - The value type for an extended attribute. If the value is less than 32768 bytes, then it is included inline. Values larger than this size are written into a vmo buffer.
- A [
Node
] which contains a sequence of bytes of definite length. - Denotes which hash algorithm is used to build the merkle tree for fsverity-enabled files.
- Node defines the minimal interface for entities which can be accessed in a filesystem.
- The reference point for updating the seek offset. See [
File.Seek
]. - A [‘Node’] which contains a symbolic link.
Constants§
- Set of rights that [
Flags.PERM_INHERIT_WRITE
] will inherit from the parent connection if specified. Note that if any of these permissions are missing from the connection, none of these permissions will be inherited. - Nodes which do not have ino values should return this value from Readdir and GetAttr.
- The maximum size for an extended attribute name.
- The maximal buffer size which can be transmitted for buffered operations. This capacity is currently set somewhat arbitrarily.
- The maximum length, in bytes, of a single filesystem component.
- The maximum size for an extended attribute value to be included inline. Values larger than this size are passed in a vmo.
- The maximum size of a chunk in the ListExtendedAttributes iterator.
- The maximum length, in bytes, of a single filesystem component.
- The maximum length, in bytes, of a filesystem path.
- The maximum size for passing the SELinux context as an attribute.
- The maximum I/O size that is allowed for read/write operations using byte vectors.
- Bits reserved for posix protections. Native fuchsia filesystems are not required to set bits contained within
MODE_PROTECTION_MASK
, but filesystems that wish to do so may refer to sys/stat.h for their definitions. - Bits indicating node type. The canonical mechanism to check for a node type is to take ‘mode’, bitwise AND it with the
MODE_TYPE_MASK
, and check exact equality against a mode type. - Flags used when opening a node reference must fall within this mask.
- All known rights.
- Set of permissions that are expected when opening a node as executable.
- Set of permissions that are expected when opening a node as readable.
- Set of permissions that are expected when opening a node as writable.
- Alias for directory permission alias rw*
- Alias for directory permission alias rx*
- Alias for directory permission alias r*
- The name of the extended attribute accessible via the SELinux context attribute.
- Alias for directory permission alias w*
- Alias for directory permission alias x*
Traits§
Type Aliases§
- Abilities are properties intrinsic to a node. They specify which operations are supported by it.
- The name of an extended attribute. It can not contain any null bytes. Other than that and the maximum size, no particular structure is imposed on the name.
- The type to identify a node, if the implementation supports some notion of unique node ID.
- The type for the name of a node, i.e. a single path component. E.g.
foo
- A path is a string of one or more components, separated by “/”. E.g.
foo/bar/baz
- Rights are properties specific to a connection. They limit which operations are allowed on a connection, including those which may be granted to new connections.
- The type to identify a connection to a node. It represents a capability: a reference to a node with associated rights.
- The byte vector type used for read/write operations.