system_updater_config/
config_lib_rust_config_lib_source.rs

1use fidl::unpersist;
2use fidl_cf_sc_internal_systemupdaterconfig::Config as FidlConfig;
3use fuchsia_component_config::{Config as ComponentConfig, Error};
4use fuchsia_inspect::{ArrayProperty, Node};
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7    0xec, 0x25, 0x51, 0x24, 0x55, 0x45, 0x27, 0x97, 0x7a, 0x1c, 0x1e, 0x84, 0x54, 0xf8, 0x07, 0xe2,
8    0x6d, 0x87, 0x88, 0x97, 0x14, 0x7f, 0x5f, 0xe4, 0xe5, 0x20, 0x67, 0x40, 0x02, 0x35, 0x4b, 0xb2,
9];
10#[derive(Debug)]
11pub struct Config {
12    pub concurrent_blob_fetches: u16,
13    pub concurrent_package_resolves: u16,
14    pub manifest_public_keys: Vec<String>,
15    pub verify_existing_blobs: bool,
16}
17impl Config {
18    #[doc = r" Take the config startup handle and parse its contents."]
19    #[doc = r""]
20    #[doc = r" # Panics"]
21    #[doc = r""]
22    #[doc = r" If the config startup handle was already taken or if it is not valid."]
23    pub fn take_from_startup_handle() -> Self {
24        <Self as ComponentConfig>::take_from_startup_handle()
25    }
26    #[doc = r" Parse `Self` from `vmo`."]
27    pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
28        <Self as ComponentConfig>::from_vmo(vmo)
29    }
30    #[doc = r" Parse `Self` from `bytes`."]
31    pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
32        <Self as ComponentConfig>::from_bytes(bytes)
33    }
34    pub fn record_inspect(&self, inspector_node: &Node) {
35        <Self as ComponentConfig>::record_inspect(self, inspector_node)
36    }
37}
38impl ComponentConfig for Config {
39    #[doc = r" Parse `Self` from `bytes`."]
40    fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
41        let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
42        let checksum_len_bytes: [u8; 2] =
43            checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
44        let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
45        let (observed_checksum, bytes) =
46            bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
47        if observed_checksum != EXPECTED_CHECKSUM {
48            return Err(Error::ChecksumMismatch {
49                expected_checksum: EXPECTED_CHECKSUM.to_vec(),
50                observed_checksum: observed_checksum.to_vec(),
51            });
52        }
53        let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
54        Ok(Self {
55            concurrent_blob_fetches: fidl_config.concurrent_blob_fetches,
56            concurrent_package_resolves: fidl_config.concurrent_package_resolves,
57            manifest_public_keys: fidl_config.manifest_public_keys,
58            verify_existing_blobs: fidl_config.verify_existing_blobs,
59        })
60    }
61    fn record_inspect(&self, inspector_node: &Node) {
62        inspector_node.record_uint("concurrent_blob_fetches", self.concurrent_blob_fetches as u64);
63        inspector_node
64            .record_uint("concurrent_package_resolves", self.concurrent_package_resolves as u64);
65        let arr = inspector_node
66            .create_string_array("manifest_public_keys", self.manifest_public_keys.len());
67        for i in 0..self.manifest_public_keys.len() {
68            arr.set(i, &self.manifest_public_keys[i]);
69        }
70        inspector_node.record(arr);
71        inspector_node.record_bool("verify_existing_blobs", self.verify_existing_blobs);
72    }
73}