pkg_cache_config/
config_lib_rust_config_lib_source.rs1use fidl::unpersist;
2use fidl_cf_sc_internal_pkgcacheconfig::Config as FidlConfig;
3use fuchsia_component_config::{Config as ComponentConfig, Error};
4use fuchsia_inspect::Node;
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7 0x1b, 0x95, 0x9f, 0xf1, 0x75, 0xdf, 0x17, 0x8b, 0xed, 0xfe, 0x4d, 0xbb, 0x4e, 0xea, 0x8d, 0xed,
8 0x14, 0x46, 0x32, 0xf5, 0xa1, 0xa7, 0x00, 0xef, 0x37, 0x9d, 0xad, 0x93, 0x67, 0x16, 0x33, 0xac,
9];
10const EXPECTED_CHECKSUM_LENGTH: [u8; 2] = (EXPECTED_CHECKSUM.len() as u16).to_le_bytes();
11#[derive(Debug)]
12pub struct Config {
13 pub all_packages_executable: bool,
14 pub enable_upgradable_packages: bool,
15 pub system_image_hash: String,
16 pub use_system_image: bool,
17}
18impl Config {
19 #[doc = r" Take the config startup handle and parse its contents."]
20 #[doc = r""]
21 #[doc = r" # Panics"]
22 #[doc = r""]
23 #[doc = r" If the config startup handle was already taken or if it is not valid."]
24 pub fn take_from_startup_handle() -> Self {
25 <Self as ComponentConfig>::take_from_startup_handle()
26 }
27 #[doc = r" Parse `Self` from `vmo`."]
28 pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
29 <Self as ComponentConfig>::from_vmo(vmo)
30 }
31 #[doc = r" Parse `Self` from `bytes`."]
32 pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
33 <Self as ComponentConfig>::from_bytes(bytes)
34 }
35 pub fn record_inspect(&self, inspector_node: &Node) {
36 <Self as ComponentConfig>::record_inspect(self, inspector_node)
37 }
38}
39impl ComponentConfig for Config {
40 #[doc = r" Parse `Self` from `bytes`."]
41 fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
42 let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
43 let checksum_len_bytes: [u8; 2] =
44 checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
45 let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
46 let (observed_checksum, bytes) =
47 bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
48 if observed_checksum != EXPECTED_CHECKSUM {
49 return Err(Error::ChecksumMismatch {
50 expected_checksum: EXPECTED_CHECKSUM.to_vec(),
51 observed_checksum: observed_checksum.to_vec(),
52 });
53 }
54 let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
55 Ok(Self {
56 all_packages_executable: fidl_config.all_packages_executable,
57 enable_upgradable_packages: fidl_config.enable_upgradable_packages,
58 system_image_hash: fidl_config.system_image_hash,
59 use_system_image: fidl_config.use_system_image,
60 })
61 }
62 fn to_bytes(&self) -> Result<Vec<u8>, Error> {
63 let fidl_config = FidlConfig {
64 all_packages_executable: self.all_packages_executable.clone(),
65 enable_upgradable_packages: self.enable_upgradable_packages.clone(),
66 system_image_hash: self.system_image_hash.clone(),
67 use_system_image: self.use_system_image.clone(),
68 };
69 let mut fidl_bytes = fidl::persist(&fidl_config).map_err(Error::Persist)?;
70 let mut bytes = Vec::with_capacity(
71 EXPECTED_CHECKSUM_LENGTH.len() + EXPECTED_CHECKSUM.len() + fidl_bytes.len(),
72 );
73 bytes.extend_from_slice(&EXPECTED_CHECKSUM_LENGTH);
74 bytes.extend_from_slice(EXPECTED_CHECKSUM);
75 bytes.append(&mut fidl_bytes);
76 Ok(bytes)
77 }
78 fn record_inspect(&self, inspector_node: &Node) {
79 inspector_node.record_bool("all_packages_executable", self.all_packages_executable);
80 inspector_node.record_bool("enable_upgradable_packages", self.enable_upgradable_packages);
81 inspector_node.record_string("system_image_hash", &self.system_image_hash);
82 inspector_node.record_bool("use_system_image", self.use_system_image);
83 }
84}