1use fidl::unpersist;
2use fidl_cf_sc_internal_a2dpprofileconfig::Config as FidlConfig;
3use fuchsia_inspect::Node;
4use fuchsia_runtime::{take_startup_handle, HandleInfo, HandleType};
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7 0x86, 0xf7, 0xab, 0x7e, 0x80, 0xb6, 0x5f, 0x16, 0x55, 0xf7, 0xf1, 0x51, 0x01, 0xd5, 0xd1, 0x1e,
8 0xb5, 0x19, 0xbb, 0xa3, 0xc4, 0x27, 0x1e, 0xd5, 0xfd, 0x77, 0xfc, 0xa2, 0x47, 0x24, 0x96, 0x85,
9];
10#[derive(Debug)]
11pub struct Config {
12 pub channel_mode: String,
13 pub domain: String,
14 pub enable_aac: bool,
15 pub enable_avrcp_target: bool,
16 pub enable_sink: bool,
17 pub initiator_delay: u32,
18 pub source_type: String,
19}
20impl Config {
21 #[doc = r" Take the config startup handle and parse its contents."]
22 #[doc = r""]
23 #[doc = r" # Panics"]
24 #[doc = r""]
25 #[doc = r" If the config startup handle was already taken or if it is not valid."]
26 pub fn take_from_startup_handle() -> Self {
27 let handle_info = HandleInfo::new(HandleType::ComponentConfigVmo, 0);
28 let config_vmo: zx::Vmo =
29 take_startup_handle(handle_info).expect("Config VMO handle must be present.").into();
30 Self::from_vmo(&config_vmo).expect("Config VMO handle must be valid.")
31 }
32 #[doc = r" Parse `Self` from `vmo`."]
33 pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
34 let config_size = vmo.get_content_size().map_err(Error::GettingContentSize)?;
35 let config_bytes = vmo.read_to_vec(0, config_size).map_err(Error::ReadingConfigBytes)?;
36 Self::from_bytes(&config_bytes)
37 }
38 #[doc = r" Parse `Self` from `bytes`."]
39 pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
40 let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
41 let checksum_len_bytes: [u8; 2] =
42 checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
43 let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
44 let (observed_checksum, bytes) =
45 bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
46 if observed_checksum != EXPECTED_CHECKSUM {
47 return Err(Error::ChecksumMismatch { observed_checksum: observed_checksum.to_vec() });
48 }
49 let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
50 Ok(Self {
51 channel_mode: fidl_config.channel_mode,
52 domain: fidl_config.domain,
53 enable_aac: fidl_config.enable_aac,
54 enable_avrcp_target: fidl_config.enable_avrcp_target,
55 enable_sink: fidl_config.enable_sink,
56 initiator_delay: fidl_config.initiator_delay,
57 source_type: fidl_config.source_type,
58 })
59 }
60 pub fn record_inspect(&self, inspector_node: &Node) {
61 inspector_node.record_string("channel_mode", &self.channel_mode);
62 inspector_node.record_string("domain", &self.domain);
63 inspector_node.record_bool("enable_aac", self.enable_aac);
64 inspector_node.record_bool("enable_avrcp_target", self.enable_avrcp_target);
65 inspector_node.record_bool("enable_sink", self.enable_sink);
66 inspector_node.record_uint("initiator_delay", self.initiator_delay as u64);
67 inspector_node.record_string("source_type", &self.source_type);
68 }
69}
70#[derive(Debug)]
71pub enum Error {
72 #[doc = r" Failed to read the content size of the VMO."]
73 GettingContentSize(zx::Status),
74 #[doc = r" Failed to read the content of the VMO."]
75 ReadingConfigBytes(zx::Status),
76 #[doc = r" The VMO was too small for this config library."]
77 TooFewBytes,
78 #[doc = r" The VMO's config ABI checksum did not match this library's."]
79 ChecksumMismatch { observed_checksum: Vec<u8> },
80 #[doc = r" Failed to parse the non-checksum bytes of the VMO as this library's FIDL type."]
81 Unpersist(fidl::Error),
82}
83impl std::fmt::Display for Error {
84 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
85 match self {
86 Self::GettingContentSize(status) => {
87 write!(f, "Failed to get content size: {status}")
88 }
89 Self::ReadingConfigBytes(status) => {
90 write!(f, "Failed to read VMO content: {status}")
91 }
92 Self::TooFewBytes => {
93 write!(f, "VMO content is not large enough for this config library.")
94 }
95 Self::ChecksumMismatch { observed_checksum } => {
96 write!(
97 f,
98 "ABI checksum mismatch, expected {:?}, got {:?}",
99 EXPECTED_CHECKSUM, observed_checksum,
100 )
101 }
102 Self::Unpersist(fidl_error) => {
103 write!(f, "Failed to parse contents of config VMO: {fidl_error}")
104 }
105 }
106 }
107}
108impl std::error::Error for Error {
109 #[allow(unused_parens, reason = "rustfmt errors without parens here")]
110 fn source(&self) -> Option<(&'_ (dyn std::error::Error + 'static))> {
111 match self {
112 Self::GettingContentSize(ref status) | Self::ReadingConfigBytes(ref status) => {
113 Some(status)
114 }
115 Self::TooFewBytes => None,
116 Self::ChecksumMismatch { .. } => None,
117 Self::Unpersist(ref fidl_error) => Some(fidl_error),
118 }
119 }
120 fn description(&self) -> &str {
121 match self {
122 Self::GettingContentSize(_) => "getting content size",
123 Self::ReadingConfigBytes(_) => "reading VMO contents",
124 Self::TooFewBytes => "VMO contents too small",
125 Self::ChecksumMismatch { .. } => "ABI checksum mismatch",
126 Self::Unpersist(_) => "FIDL parsing error",
127 }
128 }
129}