system_updater_config/
config_lib_rust_config_lib_source.rs1use fidl::unpersist;
2use fidl_cf_sc_internal_systemupdaterconfig::Config as FidlConfig;
3use fuchsia_component_config::{Config as ComponentConfig, Error};
4use fuchsia_inspect::{ArrayProperty, Node};
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7 0xec, 0x25, 0x51, 0x24, 0x55, 0x45, 0x27, 0x97, 0x7a, 0x1c, 0x1e, 0x84, 0x54, 0xf8, 0x07, 0xe2,
8 0x6d, 0x87, 0x88, 0x97, 0x14, 0x7f, 0x5f, 0xe4, 0xe5, 0x20, 0x67, 0x40, 0x02, 0x35, 0x4b, 0xb2,
9];
10const EXPECTED_CHECKSUM_LENGTH: [u8; 2] = (EXPECTED_CHECKSUM.len() as u16).to_le_bytes();
11#[derive(Debug)]
12pub struct Config {
13 pub concurrent_blob_fetches: u16,
14 pub concurrent_package_resolves: u16,
15 pub manifest_public_keys: Vec<String>,
16 pub verify_existing_blobs: bool,
17}
18impl Config {
19 #[doc = r" Take the config startup handle and parse its contents."]
20 #[doc = r""]
21 #[doc = r" # Panics"]
22 #[doc = r""]
23 #[doc = r" If the config startup handle was already taken or if it is not valid."]
24 pub fn take_from_startup_handle() -> Self {
25 <Self as ComponentConfig>::take_from_startup_handle()
26 }
27 #[doc = r" Parse `Self` from `vmo`."]
28 pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
29 <Self as ComponentConfig>::from_vmo(vmo)
30 }
31 #[doc = r" Parse `Self` from `bytes`."]
32 pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
33 <Self as ComponentConfig>::from_bytes(bytes)
34 }
35 pub fn record_inspect(&self, inspector_node: &Node) {
36 <Self as ComponentConfig>::record_inspect(self, inspector_node)
37 }
38}
39impl ComponentConfig for Config {
40 #[doc = r" Parse `Self` from `bytes`."]
41 fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
42 let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
43 let checksum_len_bytes: [u8; 2] =
44 checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
45 let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
46 let (observed_checksum, bytes) =
47 bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
48 if observed_checksum != EXPECTED_CHECKSUM {
49 return Err(Error::ChecksumMismatch {
50 expected_checksum: EXPECTED_CHECKSUM.to_vec(),
51 observed_checksum: observed_checksum.to_vec(),
52 });
53 }
54 let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
55 Ok(Self {
56 concurrent_blob_fetches: fidl_config.concurrent_blob_fetches,
57 concurrent_package_resolves: fidl_config.concurrent_package_resolves,
58 manifest_public_keys: fidl_config.manifest_public_keys,
59 verify_existing_blobs: fidl_config.verify_existing_blobs,
60 })
61 }
62 fn to_bytes(&self) -> Result<Vec<u8>, Error> {
63 let fidl_config = FidlConfig {
64 concurrent_blob_fetches: self.concurrent_blob_fetches.clone(),
65 concurrent_package_resolves: self.concurrent_package_resolves.clone(),
66 manifest_public_keys: self.manifest_public_keys.clone(),
67 verify_existing_blobs: self.verify_existing_blobs.clone(),
68 };
69 let mut fidl_bytes = fidl::persist(&fidl_config).map_err(Error::Persist)?;
70 let mut bytes = Vec::with_capacity(
71 EXPECTED_CHECKSUM_LENGTH.len() + EXPECTED_CHECKSUM.len() + fidl_bytes.len(),
72 );
73 bytes.extend_from_slice(&EXPECTED_CHECKSUM_LENGTH);
74 bytes.extend_from_slice(EXPECTED_CHECKSUM);
75 bytes.append(&mut fidl_bytes);
76 Ok(bytes)
77 }
78 fn record_inspect(&self, inspector_node: &Node) {
79 inspector_node.record_uint("concurrent_blob_fetches", self.concurrent_blob_fetches as u64);
80 inspector_node
81 .record_uint("concurrent_package_resolves", self.concurrent_package_resolves as u64);
82 let arr = inspector_node
83 .create_string_array("manifest_public_keys", self.manifest_public_keys.len());
84 for i in 0..self.manifest_public_keys.len() {
85 arr.set(i, &self.manifest_public_keys[i]);
86 }
87 inspector_node.record(arr);
88 inspector_node.record_bool("verify_existing_blobs", self.verify_existing_blobs);
89 }
90}