fastpair_provider_config/
fastpair_provider_config_rust_config_lib_source.rs1use fidl::unpersist;
2use fidl_cf_sc_internal_fastpairproviderconfig::Config as FidlConfig;
3use fuchsia_component_config::{Config as ComponentConfig, Error};
4use fuchsia_inspect::Node;
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7 0x02, 0x2c, 0xa3, 0x90, 0x02, 0x7d, 0x16, 0x4a, 0x52, 0x3c, 0x84, 0xef, 0xfa, 0x9a, 0xf6, 0xa0,
8 0x65, 0x19, 0xfa, 0x44, 0x07, 0xcf, 0x11, 0x61, 0x70, 0x5b, 0x7c, 0x2a, 0x07, 0xe9, 0x1c, 0x49,
9];
10const EXPECTED_CHECKSUM_LENGTH: [u8; 2] = (EXPECTED_CHECKSUM.len() as u16).to_le_bytes();
11#[derive(Debug)]
12pub struct Config {
13 pub firmware_revision: String,
14 pub model_id: u32,
15 pub private_key: String,
16}
17impl Config {
18 #[doc = r" Take the config startup handle and parse its contents."]
19 #[doc = r""]
20 #[doc = r" # Panics"]
21 #[doc = r""]
22 #[doc = r" If the config startup handle was already taken or if it is not valid."]
23 pub fn take_from_startup_handle() -> Self {
24 <Self as ComponentConfig>::take_from_startup_handle()
25 }
26 #[doc = r" Parse `Self` from `vmo`."]
27 pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
28 <Self as ComponentConfig>::from_vmo(vmo)
29 }
30 #[doc = r" Parse `Self` from `bytes`."]
31 pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
32 <Self as ComponentConfig>::from_bytes(bytes)
33 }
34 pub fn record_inspect(&self, inspector_node: &Node) {
35 <Self as ComponentConfig>::record_inspect(self, inspector_node)
36 }
37}
38impl ComponentConfig for Config {
39 #[doc = r" Parse `Self` from `bytes`."]
40 fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
41 let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
42 let checksum_len_bytes: [u8; 2] =
43 checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
44 let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
45 let (observed_checksum, bytes) =
46 bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
47 if observed_checksum != EXPECTED_CHECKSUM {
48 return Err(Error::ChecksumMismatch {
49 expected_checksum: EXPECTED_CHECKSUM.to_vec(),
50 observed_checksum: observed_checksum.to_vec(),
51 });
52 }
53 let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
54 Ok(Self {
55 firmware_revision: fidl_config.firmware_revision,
56 model_id: fidl_config.model_id,
57 private_key: fidl_config.private_key,
58 })
59 }
60 fn to_bytes(&self) -> Result<Vec<u8>, Error> {
61 let fidl_config = FidlConfig {
62 firmware_revision: self.firmware_revision.clone(),
63 model_id: self.model_id.clone(),
64 private_key: self.private_key.clone(),
65 };
66 let mut fidl_bytes = fidl::persist(&fidl_config).map_err(Error::Persist)?;
67 let mut bytes = Vec::with_capacity(
68 EXPECTED_CHECKSUM_LENGTH.len() + EXPECTED_CHECKSUM.len() + fidl_bytes.len(),
69 );
70 bytes.extend_from_slice(&EXPECTED_CHECKSUM_LENGTH);
71 bytes.extend_from_slice(EXPECTED_CHECKSUM);
72 bytes.append(&mut fidl_bytes);
73 Ok(bytes)
74 }
75 fn record_inspect(&self, inspector_node: &Node) {
76 inspector_node.record_string("firmware_revision", &self.firmware_revision);
77 inspector_node.record_uint("model_id", self.model_id as u64);
78 inspector_node.record_string("private_key", &self.private_key);
79 }
80}