a2dp_profile_config/
a2dp_profile_config_rust_config_lib_source.rs

1use fidl::unpersist;
2use fidl_cf_sc_internal_a2dpprofileconfig::Config as FidlConfig;
3use fuchsia_inspect::Node;
4use fuchsia_runtime::{take_startup_handle, HandleInfo, HandleType};
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7    0x86, 0xf7, 0xab, 0x7e, 0x80, 0xb6, 0x5f, 0x16, 0x55, 0xf7, 0xf1, 0x51, 0x01, 0xd5, 0xd1, 0x1e,
8    0xb5, 0x19, 0xbb, 0xa3, 0xc4, 0x27, 0x1e, 0xd5, 0xfd, 0x77, 0xfc, 0xa2, 0x47, 0x24, 0x96, 0x85,
9];
10#[derive(Debug)]
11pub struct Config {
12    pub channel_mode: String,
13    pub domain: String,
14    pub enable_aac: bool,
15    pub enable_avrcp_target: bool,
16    pub enable_sink: bool,
17    pub initiator_delay: u32,
18    pub source_type: String,
19}
20impl Config {
21    #[doc = r" Take the config startup handle and parse its contents."]
22    #[doc = r""]
23    #[doc = r" # Panics"]
24    #[doc = r""]
25    #[doc = r" If the config startup handle was already taken or if it is not valid."]
26    pub fn take_from_startup_handle() -> Self {
27        let handle_info = HandleInfo::new(HandleType::ComponentConfigVmo, 0);
28        let config_vmo: zx::Vmo =
29            take_startup_handle(handle_info).expect("Config VMO handle must be present.").into();
30        Self::from_vmo(&config_vmo).expect("Config VMO handle must be valid.")
31    }
32    #[doc = r" Parse `Self` from `vmo`."]
33    pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
34        let config_size = vmo.get_content_size().map_err(Error::GettingContentSize)?;
35        let config_bytes = vmo.read_to_vec(0, config_size).map_err(Error::ReadingConfigBytes)?;
36        Self::from_bytes(&config_bytes)
37    }
38    #[doc = r" Parse `Self` from `bytes`."]
39    pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
40        let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
41        let checksum_len_bytes: [u8; 2] =
42            checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
43        let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
44        let (observed_checksum, bytes) =
45            bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
46        if observed_checksum != EXPECTED_CHECKSUM {
47            return Err(Error::ChecksumMismatch { observed_checksum: observed_checksum.to_vec() });
48        }
49        let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
50        Ok(Self {
51            channel_mode: fidl_config.channel_mode,
52            domain: fidl_config.domain,
53            enable_aac: fidl_config.enable_aac,
54            enable_avrcp_target: fidl_config.enable_avrcp_target,
55            enable_sink: fidl_config.enable_sink,
56            initiator_delay: fidl_config.initiator_delay,
57            source_type: fidl_config.source_type,
58        })
59    }
60    pub fn record_inspect(&self, inspector_node: &Node) {
61        inspector_node.record_string("channel_mode", &self.channel_mode);
62        inspector_node.record_string("domain", &self.domain);
63        inspector_node.record_bool("enable_aac", self.enable_aac);
64        inspector_node.record_bool("enable_avrcp_target", self.enable_avrcp_target);
65        inspector_node.record_bool("enable_sink", self.enable_sink);
66        inspector_node.record_uint("initiator_delay", self.initiator_delay as u64);
67        inspector_node.record_string("source_type", &self.source_type);
68    }
69}
70#[derive(Debug)]
71pub enum Error {
72    #[doc = r" Failed to read the content size of the VMO."]
73    GettingContentSize(zx::Status),
74    #[doc = r" Failed to read the content of the VMO."]
75    ReadingConfigBytes(zx::Status),
76    #[doc = r" The VMO was too small for this config library."]
77    TooFewBytes,
78    #[doc = r" The VMO's config ABI checksum did not match this library's."]
79    ChecksumMismatch { observed_checksum: Vec<u8> },
80    #[doc = r" Failed to parse the non-checksum bytes of the VMO as this library's FIDL type."]
81    Unpersist(fidl::Error),
82}
83impl std::fmt::Display for Error {
84    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
85        match self {
86            Self::GettingContentSize(status) => {
87                write!(f, "Failed to get content size: {status}")
88            }
89            Self::ReadingConfigBytes(status) => {
90                write!(f, "Failed to read VMO content: {status}")
91            }
92            Self::TooFewBytes => {
93                write!(f, "VMO content is not large enough for this config library.")
94            }
95            Self::ChecksumMismatch { observed_checksum } => {
96                write!(
97                    f,
98                    "ABI checksum mismatch, expected {:?}, got {:?}",
99                    EXPECTED_CHECKSUM, observed_checksum,
100                )
101            }
102            Self::Unpersist(fidl_error) => {
103                write!(f, "Failed to parse contents of config VMO: {fidl_error}")
104            }
105        }
106    }
107}
108impl std::error::Error for Error {
109    #[allow(unused_parens, reason = "rustfmt errors without parens here")]
110    fn source(&self) -> Option<(&'_ (dyn std::error::Error + 'static))> {
111        match self {
112            Self::GettingContentSize(ref status) | Self::ReadingConfigBytes(ref status) => {
113                Some(status)
114            }
115            Self::TooFewBytes => None,
116            Self::ChecksumMismatch { .. } => None,
117            Self::Unpersist(ref fidl_error) => Some(fidl_error),
118        }
119    }
120    fn description(&self) -> &str {
121        match self {
122            Self::GettingContentSize(_) => "getting content size",
123            Self::ReadingConfigBytes(_) => "reading VMO contents",
124            Self::TooFewBytes => "VMO contents too small",
125            Self::ChecksumMismatch { .. } => "ABI checksum mismatch",
126            Self::Unpersist(_) => "FIDL parsing error",
127        }
128    }
129}