fidl_fuchsia_netemul_test/
fidl_fuchsia_netemul_test.rs

1// WARNING: This file is machine generated by fidlgen.
2
3#![warn(clippy::all)]
4#![allow(unused_parens, unused_mut, unused_imports, nonstandard_style)]
5
6use bitflags::bitflags;
7use fidl::client::QueryResponseFut;
8use fidl::encoding::{MessageBufFor, ProxyChannelBox, ResourceDialect};
9use fidl::endpoints::{ControlHandle as _, Responder as _};
10pub use fidl_fuchsia_netemul_test_common::*;
11use futures::future::{self, MaybeDone, TryFutureExt};
12use zx_status;
13
14#[derive(Debug, Eq, Hash, Ord, PartialEq, PartialOrd)]
15pub struct CounterConnectToProtocolRequest {
16    pub protocol_name: String,
17    pub request: fidl::Channel,
18}
19
20impl fidl::Standalone<fidl::encoding::DefaultFuchsiaResourceDialect>
21    for CounterConnectToProtocolRequest
22{
23}
24
25#[derive(Debug, Eq, Hash, Ord, PartialEq, PartialOrd)]
26pub struct CounterOpenInNamespaceRequest {
27    pub path: String,
28    pub flags: fidl_fuchsia_io::Flags,
29    pub request: fidl::Channel,
30}
31
32impl fidl::Standalone<fidl::encoding::DefaultFuchsiaResourceDialect>
33    for CounterOpenInNamespaceRequest
34{
35}
36
37#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
38pub struct CounterMarker;
39
40impl fidl::endpoints::ProtocolMarker for CounterMarker {
41    type Proxy = CounterProxy;
42    type RequestStream = CounterRequestStream;
43    #[cfg(target_os = "fuchsia")]
44    type SynchronousProxy = CounterSynchronousProxy;
45
46    const DEBUG_NAME: &'static str = "fuchsia.netemul.test.Counter";
47}
48impl fidl::endpoints::DiscoverableProtocolMarker for CounterMarker {}
49pub type CounterTryOpenDirectoryResult = Result<(), i32>;
50
51pub trait CounterProxyInterface: Send + Sync {
52    type IncrementResponseFut: std::future::Future<Output = Result<u32, fidl::Error>> + Send;
53    fn r#increment(&self) -> Self::IncrementResponseFut;
54    fn r#connect_to_protocol(
55        &self,
56        protocol_name: &str,
57        request: fidl::Channel,
58    ) -> Result<(), fidl::Error>;
59    fn r#open_in_namespace(
60        &self,
61        path: &str,
62        flags: fidl_fuchsia_io::Flags,
63        request: fidl::Channel,
64    ) -> Result<(), fidl::Error>;
65    type TryOpenDirectoryResponseFut: std::future::Future<Output = Result<CounterTryOpenDirectoryResult, fidl::Error>>
66        + Send;
67    fn r#try_open_directory(&self, path: &str) -> Self::TryOpenDirectoryResponseFut;
68}
69#[derive(Debug)]
70#[cfg(target_os = "fuchsia")]
71pub struct CounterSynchronousProxy {
72    client: fidl::client::sync::Client,
73}
74
75#[cfg(target_os = "fuchsia")]
76impl fidl::endpoints::SynchronousProxy for CounterSynchronousProxy {
77    type Proxy = CounterProxy;
78    type Protocol = CounterMarker;
79
80    fn from_channel(inner: fidl::Channel) -> Self {
81        Self::new(inner)
82    }
83
84    fn into_channel(self) -> fidl::Channel {
85        self.client.into_channel()
86    }
87
88    fn as_channel(&self) -> &fidl::Channel {
89        self.client.as_channel()
90    }
91}
92
93#[cfg(target_os = "fuchsia")]
94impl CounterSynchronousProxy {
95    pub fn new(channel: fidl::Channel) -> Self {
96        let protocol_name = <CounterMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
97        Self { client: fidl::client::sync::Client::new(channel, protocol_name) }
98    }
99
100    pub fn into_channel(self) -> fidl::Channel {
101        self.client.into_channel()
102    }
103
104    /// Waits until an event arrives and returns it. It is safe for other
105    /// threads to make concurrent requests while waiting for an event.
106    pub fn wait_for_event(
107        &self,
108        deadline: zx::MonotonicInstant,
109    ) -> Result<CounterEvent, fidl::Error> {
110        CounterEvent::decode(self.client.wait_for_event(deadline)?)
111    }
112
113    /// Increments internal counter by one and returns new counter value.
114    pub fn r#increment(&self, ___deadline: zx::MonotonicInstant) -> Result<u32, fidl::Error> {
115        let _response =
116            self.client.send_query::<fidl::encoding::EmptyPayload, CounterIncrementResponse>(
117                (),
118                0x60cf610cd915d7a9,
119                fidl::encoding::DynamicFlags::empty(),
120                ___deadline,
121            )?;
122        Ok(_response.value)
123    }
124
125    /// Connects `request` to a protocol in the `/svc` directory named
126    /// `protocol_name`.
127    pub fn r#connect_to_protocol(
128        &self,
129        mut protocol_name: &str,
130        mut request: fidl::Channel,
131    ) -> Result<(), fidl::Error> {
132        self.client.send::<CounterConnectToProtocolRequest>(
133            (protocol_name, request),
134            0x75ea8d3a0e7a4f68,
135            fidl::encoding::DynamicFlags::empty(),
136        )
137    }
138
139    /// Opens the node found at `path` in the component's namespace with
140    /// `flags`, and connects `request`.
141    ///
142    /// This is essentially a wrapper around [`fuchsia.io/Directory.Open`],
143    /// which always opens in an implementation-defined mode.
144    ///
145    /// + request `path` the absolute path from the root of the server's
146    ///     namespace.
147    /// + request `flags` the rights with which to open the node.
148    /// + request `request` the server end channel to the node.
149    pub fn r#open_in_namespace(
150        &self,
151        mut path: &str,
152        mut flags: fidl_fuchsia_io::Flags,
153        mut request: fidl::Channel,
154    ) -> Result<(), fidl::Error> {
155        self.client.send::<CounterOpenInNamespaceRequest>(
156            (path, flags, request),
157            0x393b5808935aee83,
158            fidl::encoding::DynamicFlags::empty(),
159        )
160    }
161
162    /// Opens the directory found at `path`.
163    ///
164    /// + request `path` the absolute path from the server's namespace.
165    /// * error `ZX_ERR_NOT_FOUND` if the directory at `path` is not in the server's namespace.
166    /// * error `ZX_ERR_IO` if there is some other unspecified error during I/O.
167    pub fn r#try_open_directory(
168        &self,
169        mut path: &str,
170        ___deadline: zx::MonotonicInstant,
171    ) -> Result<CounterTryOpenDirectoryResult, fidl::Error> {
172        let _response = self.client.send_query::<
173            CounterTryOpenDirectoryRequest,
174            fidl::encoding::ResultType<fidl::encoding::EmptyStruct, i32>,
175        >(
176            (path,),
177            0x37310702b1c8b863,
178            fidl::encoding::DynamicFlags::empty(),
179            ___deadline,
180        )?;
181        Ok(_response.map(|x| x))
182    }
183}
184
185#[cfg(target_os = "fuchsia")]
186impl From<CounterSynchronousProxy> for zx::Handle {
187    fn from(value: CounterSynchronousProxy) -> Self {
188        value.into_channel().into()
189    }
190}
191
192#[cfg(target_os = "fuchsia")]
193impl From<fidl::Channel> for CounterSynchronousProxy {
194    fn from(value: fidl::Channel) -> Self {
195        Self::new(value)
196    }
197}
198
199#[derive(Debug, Clone)]
200pub struct CounterProxy {
201    client: fidl::client::Client<fidl::encoding::DefaultFuchsiaResourceDialect>,
202}
203
204impl fidl::endpoints::Proxy for CounterProxy {
205    type Protocol = CounterMarker;
206
207    fn from_channel(inner: ::fidl::AsyncChannel) -> Self {
208        Self::new(inner)
209    }
210
211    fn into_channel(self) -> Result<::fidl::AsyncChannel, Self> {
212        self.client.into_channel().map_err(|client| Self { client })
213    }
214
215    fn as_channel(&self) -> &::fidl::AsyncChannel {
216        self.client.as_channel()
217    }
218}
219
220impl CounterProxy {
221    /// Create a new Proxy for fuchsia.netemul.test/Counter.
222    pub fn new(channel: ::fidl::AsyncChannel) -> Self {
223        let protocol_name = <CounterMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
224        Self { client: fidl::client::Client::new(channel, protocol_name) }
225    }
226
227    /// Get a Stream of events from the remote end of the protocol.
228    ///
229    /// # Panics
230    ///
231    /// Panics if the event stream was already taken.
232    pub fn take_event_stream(&self) -> CounterEventStream {
233        CounterEventStream { event_receiver: self.client.take_event_receiver() }
234    }
235
236    /// Increments internal counter by one and returns new counter value.
237    pub fn r#increment(
238        &self,
239    ) -> fidl::client::QueryResponseFut<u32, fidl::encoding::DefaultFuchsiaResourceDialect> {
240        CounterProxyInterface::r#increment(self)
241    }
242
243    /// Connects `request` to a protocol in the `/svc` directory named
244    /// `protocol_name`.
245    pub fn r#connect_to_protocol(
246        &self,
247        mut protocol_name: &str,
248        mut request: fidl::Channel,
249    ) -> Result<(), fidl::Error> {
250        CounterProxyInterface::r#connect_to_protocol(self, protocol_name, request)
251    }
252
253    /// Opens the node found at `path` in the component's namespace with
254    /// `flags`, and connects `request`.
255    ///
256    /// This is essentially a wrapper around [`fuchsia.io/Directory.Open`],
257    /// which always opens in an implementation-defined mode.
258    ///
259    /// + request `path` the absolute path from the root of the server's
260    ///     namespace.
261    /// + request `flags` the rights with which to open the node.
262    /// + request `request` the server end channel to the node.
263    pub fn r#open_in_namespace(
264        &self,
265        mut path: &str,
266        mut flags: fidl_fuchsia_io::Flags,
267        mut request: fidl::Channel,
268    ) -> Result<(), fidl::Error> {
269        CounterProxyInterface::r#open_in_namespace(self, path, flags, request)
270    }
271
272    /// Opens the directory found at `path`.
273    ///
274    /// + request `path` the absolute path from the server's namespace.
275    /// * error `ZX_ERR_NOT_FOUND` if the directory at `path` is not in the server's namespace.
276    /// * error `ZX_ERR_IO` if there is some other unspecified error during I/O.
277    pub fn r#try_open_directory(
278        &self,
279        mut path: &str,
280    ) -> fidl::client::QueryResponseFut<
281        CounterTryOpenDirectoryResult,
282        fidl::encoding::DefaultFuchsiaResourceDialect,
283    > {
284        CounterProxyInterface::r#try_open_directory(self, path)
285    }
286}
287
288impl CounterProxyInterface for CounterProxy {
289    type IncrementResponseFut =
290        fidl::client::QueryResponseFut<u32, fidl::encoding::DefaultFuchsiaResourceDialect>;
291    fn r#increment(&self) -> Self::IncrementResponseFut {
292        fn _decode(
293            mut _buf: Result<<fidl::encoding::DefaultFuchsiaResourceDialect as fidl::encoding::ResourceDialect>::MessageBufEtc, fidl::Error>,
294        ) -> Result<u32, fidl::Error> {
295            let _response = fidl::client::decode_transaction_body::<
296                CounterIncrementResponse,
297                fidl::encoding::DefaultFuchsiaResourceDialect,
298                0x60cf610cd915d7a9,
299            >(_buf?)?;
300            Ok(_response.value)
301        }
302        self.client.send_query_and_decode::<fidl::encoding::EmptyPayload, u32>(
303            (),
304            0x60cf610cd915d7a9,
305            fidl::encoding::DynamicFlags::empty(),
306            _decode,
307        )
308    }
309
310    fn r#connect_to_protocol(
311        &self,
312        mut protocol_name: &str,
313        mut request: fidl::Channel,
314    ) -> Result<(), fidl::Error> {
315        self.client.send::<CounterConnectToProtocolRequest>(
316            (protocol_name, request),
317            0x75ea8d3a0e7a4f68,
318            fidl::encoding::DynamicFlags::empty(),
319        )
320    }
321
322    fn r#open_in_namespace(
323        &self,
324        mut path: &str,
325        mut flags: fidl_fuchsia_io::Flags,
326        mut request: fidl::Channel,
327    ) -> Result<(), fidl::Error> {
328        self.client.send::<CounterOpenInNamespaceRequest>(
329            (path, flags, request),
330            0x393b5808935aee83,
331            fidl::encoding::DynamicFlags::empty(),
332        )
333    }
334
335    type TryOpenDirectoryResponseFut = fidl::client::QueryResponseFut<
336        CounterTryOpenDirectoryResult,
337        fidl::encoding::DefaultFuchsiaResourceDialect,
338    >;
339    fn r#try_open_directory(&self, mut path: &str) -> Self::TryOpenDirectoryResponseFut {
340        fn _decode(
341            mut _buf: Result<<fidl::encoding::DefaultFuchsiaResourceDialect as fidl::encoding::ResourceDialect>::MessageBufEtc, fidl::Error>,
342        ) -> Result<CounterTryOpenDirectoryResult, fidl::Error> {
343            let _response = fidl::client::decode_transaction_body::<
344                fidl::encoding::ResultType<fidl::encoding::EmptyStruct, i32>,
345                fidl::encoding::DefaultFuchsiaResourceDialect,
346                0x37310702b1c8b863,
347            >(_buf?)?;
348            Ok(_response.map(|x| x))
349        }
350        self.client
351            .send_query_and_decode::<CounterTryOpenDirectoryRequest, CounterTryOpenDirectoryResult>(
352                (path,),
353                0x37310702b1c8b863,
354                fidl::encoding::DynamicFlags::empty(),
355                _decode,
356            )
357    }
358}
359
360pub struct CounterEventStream {
361    event_receiver: fidl::client::EventReceiver<fidl::encoding::DefaultFuchsiaResourceDialect>,
362}
363
364impl std::marker::Unpin for CounterEventStream {}
365
366impl futures::stream::FusedStream for CounterEventStream {
367    fn is_terminated(&self) -> bool {
368        self.event_receiver.is_terminated()
369    }
370}
371
372impl futures::Stream for CounterEventStream {
373    type Item = Result<CounterEvent, fidl::Error>;
374
375    fn poll_next(
376        mut self: std::pin::Pin<&mut Self>,
377        cx: &mut std::task::Context<'_>,
378    ) -> std::task::Poll<Option<Self::Item>> {
379        match futures::ready!(futures::stream::StreamExt::poll_next_unpin(
380            &mut self.event_receiver,
381            cx
382        )?) {
383            Some(buf) => std::task::Poll::Ready(Some(CounterEvent::decode(buf))),
384            None => std::task::Poll::Ready(None),
385        }
386    }
387}
388
389#[derive(Debug)]
390pub enum CounterEvent {}
391
392impl CounterEvent {
393    /// Decodes a message buffer as a [`CounterEvent`].
394    fn decode(
395        mut buf: <fidl::encoding::DefaultFuchsiaResourceDialect as fidl::encoding::ResourceDialect>::MessageBufEtc,
396    ) -> Result<CounterEvent, fidl::Error> {
397        let (bytes, _handles) = buf.split_mut();
398        let (tx_header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
399        debug_assert_eq!(tx_header.tx_id, 0);
400        match tx_header.ordinal {
401            _ => Err(fidl::Error::UnknownOrdinal {
402                ordinal: tx_header.ordinal,
403                protocol_name: <CounterMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
404            }),
405        }
406    }
407}
408
409/// A Stream of incoming requests for fuchsia.netemul.test/Counter.
410pub struct CounterRequestStream {
411    inner: std::sync::Arc<fidl::ServeInner<fidl::encoding::DefaultFuchsiaResourceDialect>>,
412    is_terminated: bool,
413}
414
415impl std::marker::Unpin for CounterRequestStream {}
416
417impl futures::stream::FusedStream for CounterRequestStream {
418    fn is_terminated(&self) -> bool {
419        self.is_terminated
420    }
421}
422
423impl fidl::endpoints::RequestStream for CounterRequestStream {
424    type Protocol = CounterMarker;
425    type ControlHandle = CounterControlHandle;
426
427    fn from_channel(channel: ::fidl::AsyncChannel) -> Self {
428        Self { inner: std::sync::Arc::new(fidl::ServeInner::new(channel)), is_terminated: false }
429    }
430
431    fn control_handle(&self) -> Self::ControlHandle {
432        CounterControlHandle { inner: self.inner.clone() }
433    }
434
435    fn into_inner(
436        self,
437    ) -> (::std::sync::Arc<fidl::ServeInner<fidl::encoding::DefaultFuchsiaResourceDialect>>, bool)
438    {
439        (self.inner, self.is_terminated)
440    }
441
442    fn from_inner(
443        inner: std::sync::Arc<fidl::ServeInner<fidl::encoding::DefaultFuchsiaResourceDialect>>,
444        is_terminated: bool,
445    ) -> Self {
446        Self { inner, is_terminated }
447    }
448}
449
450impl futures::Stream for CounterRequestStream {
451    type Item = Result<CounterRequest, fidl::Error>;
452
453    fn poll_next(
454        mut self: std::pin::Pin<&mut Self>,
455        cx: &mut std::task::Context<'_>,
456    ) -> std::task::Poll<Option<Self::Item>> {
457        let this = &mut *self;
458        if this.inner.check_shutdown(cx) {
459            this.is_terminated = true;
460            return std::task::Poll::Ready(None);
461        }
462        if this.is_terminated {
463            panic!("polled CounterRequestStream after completion");
464        }
465        fidl::encoding::with_tls_decode_buf::<_, fidl::encoding::DefaultFuchsiaResourceDialect>(
466            |bytes, handles| {
467                match this.inner.channel().read_etc(cx, bytes, handles) {
468                    std::task::Poll::Ready(Ok(())) => {}
469                    std::task::Poll::Pending => return std::task::Poll::Pending,
470                    std::task::Poll::Ready(Err(zx_status::Status::PEER_CLOSED)) => {
471                        this.is_terminated = true;
472                        return std::task::Poll::Ready(None);
473                    }
474                    std::task::Poll::Ready(Err(e)) => {
475                        return std::task::Poll::Ready(Some(Err(fidl::Error::ServerRequestRead(
476                            e.into(),
477                        ))))
478                    }
479                }
480
481                // A message has been received from the channel
482                let (header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
483
484                std::task::Poll::Ready(Some(match header.ordinal {
485                    0x60cf610cd915d7a9 => {
486                        header.validate_request_tx_id(fidl::MethodType::TwoWay)?;
487                        let mut req = fidl::new_empty!(
488                            fidl::encoding::EmptyPayload,
489                            fidl::encoding::DefaultFuchsiaResourceDialect
490                        );
491                        fidl::encoding::Decoder::<fidl::encoding::DefaultFuchsiaResourceDialect>::decode_into::<fidl::encoding::EmptyPayload>(&header, _body_bytes, handles, &mut req)?;
492                        let control_handle = CounterControlHandle { inner: this.inner.clone() };
493                        Ok(CounterRequest::Increment {
494                            responder: CounterIncrementResponder {
495                                control_handle: std::mem::ManuallyDrop::new(control_handle),
496                                tx_id: header.tx_id,
497                            },
498                        })
499                    }
500                    0x75ea8d3a0e7a4f68 => {
501                        header.validate_request_tx_id(fidl::MethodType::OneWay)?;
502                        let mut req = fidl::new_empty!(
503                            CounterConnectToProtocolRequest,
504                            fidl::encoding::DefaultFuchsiaResourceDialect
505                        );
506                        fidl::encoding::Decoder::<fidl::encoding::DefaultFuchsiaResourceDialect>::decode_into::<CounterConnectToProtocolRequest>(&header, _body_bytes, handles, &mut req)?;
507                        let control_handle = CounterControlHandle { inner: this.inner.clone() };
508                        Ok(CounterRequest::ConnectToProtocol {
509                            protocol_name: req.protocol_name,
510                            request: req.request,
511
512                            control_handle,
513                        })
514                    }
515                    0x393b5808935aee83 => {
516                        header.validate_request_tx_id(fidl::MethodType::OneWay)?;
517                        let mut req = fidl::new_empty!(
518                            CounterOpenInNamespaceRequest,
519                            fidl::encoding::DefaultFuchsiaResourceDialect
520                        );
521                        fidl::encoding::Decoder::<fidl::encoding::DefaultFuchsiaResourceDialect>::decode_into::<CounterOpenInNamespaceRequest>(&header, _body_bytes, handles, &mut req)?;
522                        let control_handle = CounterControlHandle { inner: this.inner.clone() };
523                        Ok(CounterRequest::OpenInNamespace {
524                            path: req.path,
525                            flags: req.flags,
526                            request: req.request,
527
528                            control_handle,
529                        })
530                    }
531                    0x37310702b1c8b863 => {
532                        header.validate_request_tx_id(fidl::MethodType::TwoWay)?;
533                        let mut req = fidl::new_empty!(
534                            CounterTryOpenDirectoryRequest,
535                            fidl::encoding::DefaultFuchsiaResourceDialect
536                        );
537                        fidl::encoding::Decoder::<fidl::encoding::DefaultFuchsiaResourceDialect>::decode_into::<CounterTryOpenDirectoryRequest>(&header, _body_bytes, handles, &mut req)?;
538                        let control_handle = CounterControlHandle { inner: this.inner.clone() };
539                        Ok(CounterRequest::TryOpenDirectory {
540                            path: req.path,
541
542                            responder: CounterTryOpenDirectoryResponder {
543                                control_handle: std::mem::ManuallyDrop::new(control_handle),
544                                tx_id: header.tx_id,
545                            },
546                        })
547                    }
548                    _ => Err(fidl::Error::UnknownOrdinal {
549                        ordinal: header.ordinal,
550                        protocol_name:
551                            <CounterMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
552                    }),
553                }))
554            },
555        )
556    }
557}
558
559/// Sample interface that keeps a stateful integer counter starting at zero.
560#[derive(Debug)]
561pub enum CounterRequest {
562    /// Increments internal counter by one and returns new counter value.
563    Increment { responder: CounterIncrementResponder },
564    /// Connects `request` to a protocol in the `/svc` directory named
565    /// `protocol_name`.
566    ConnectToProtocol {
567        protocol_name: String,
568        request: fidl::Channel,
569        control_handle: CounterControlHandle,
570    },
571    /// Opens the node found at `path` in the component's namespace with
572    /// `flags`, and connects `request`.
573    ///
574    /// This is essentially a wrapper around [`fuchsia.io/Directory.Open`],
575    /// which always opens in an implementation-defined mode.
576    ///
577    /// + request `path` the absolute path from the root of the server's
578    ///     namespace.
579    /// + request `flags` the rights with which to open the node.
580    /// + request `request` the server end channel to the node.
581    OpenInNamespace {
582        path: String,
583        flags: fidl_fuchsia_io::Flags,
584        request: fidl::Channel,
585        control_handle: CounterControlHandle,
586    },
587    /// Opens the directory found at `path`.
588    ///
589    /// + request `path` the absolute path from the server's namespace.
590    /// * error `ZX_ERR_NOT_FOUND` if the directory at `path` is not in the server's namespace.
591    /// * error `ZX_ERR_IO` if there is some other unspecified error during I/O.
592    TryOpenDirectory { path: String, responder: CounterTryOpenDirectoryResponder },
593}
594
595impl CounterRequest {
596    #[allow(irrefutable_let_patterns)]
597    pub fn into_increment(self) -> Option<(CounterIncrementResponder)> {
598        if let CounterRequest::Increment { responder } = self {
599            Some((responder))
600        } else {
601            None
602        }
603    }
604
605    #[allow(irrefutable_let_patterns)]
606    pub fn into_connect_to_protocol(self) -> Option<(String, fidl::Channel, CounterControlHandle)> {
607        if let CounterRequest::ConnectToProtocol { protocol_name, request, control_handle } = self {
608            Some((protocol_name, request, control_handle))
609        } else {
610            None
611        }
612    }
613
614    #[allow(irrefutable_let_patterns)]
615    pub fn into_open_in_namespace(
616        self,
617    ) -> Option<(String, fidl_fuchsia_io::Flags, fidl::Channel, CounterControlHandle)> {
618        if let CounterRequest::OpenInNamespace { path, flags, request, control_handle } = self {
619            Some((path, flags, request, control_handle))
620        } else {
621            None
622        }
623    }
624
625    #[allow(irrefutable_let_patterns)]
626    pub fn into_try_open_directory(self) -> Option<(String, CounterTryOpenDirectoryResponder)> {
627        if let CounterRequest::TryOpenDirectory { path, responder } = self {
628            Some((path, responder))
629        } else {
630            None
631        }
632    }
633
634    /// Name of the method defined in FIDL
635    pub fn method_name(&self) -> &'static str {
636        match *self {
637            CounterRequest::Increment { .. } => "increment",
638            CounterRequest::ConnectToProtocol { .. } => "connect_to_protocol",
639            CounterRequest::OpenInNamespace { .. } => "open_in_namespace",
640            CounterRequest::TryOpenDirectory { .. } => "try_open_directory",
641        }
642    }
643}
644
645#[derive(Debug, Clone)]
646pub struct CounterControlHandle {
647    inner: std::sync::Arc<fidl::ServeInner<fidl::encoding::DefaultFuchsiaResourceDialect>>,
648}
649
650impl fidl::endpoints::ControlHandle for CounterControlHandle {
651    fn shutdown(&self) {
652        self.inner.shutdown()
653    }
654    fn shutdown_with_epitaph(&self, status: zx_status::Status) {
655        self.inner.shutdown_with_epitaph(status)
656    }
657
658    fn is_closed(&self) -> bool {
659        self.inner.channel().is_closed()
660    }
661    fn on_closed(&self) -> fidl::OnSignalsRef<'_> {
662        self.inner.channel().on_closed()
663    }
664
665    #[cfg(target_os = "fuchsia")]
666    fn signal_peer(
667        &self,
668        clear_mask: zx::Signals,
669        set_mask: zx::Signals,
670    ) -> Result<(), zx_status::Status> {
671        use fidl::Peered;
672        self.inner.channel().signal_peer(clear_mask, set_mask)
673    }
674}
675
676impl CounterControlHandle {}
677
678#[must_use = "FIDL methods require a response to be sent"]
679#[derive(Debug)]
680pub struct CounterIncrementResponder {
681    control_handle: std::mem::ManuallyDrop<CounterControlHandle>,
682    tx_id: u32,
683}
684
685/// Set the the channel to be shutdown (see [`CounterControlHandle::shutdown`])
686/// if the responder is dropped without sending a response, so that the client
687/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
688impl std::ops::Drop for CounterIncrementResponder {
689    fn drop(&mut self) {
690        self.control_handle.shutdown();
691        // Safety: drops once, never accessed again
692        unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
693    }
694}
695
696impl fidl::endpoints::Responder for CounterIncrementResponder {
697    type ControlHandle = CounterControlHandle;
698
699    fn control_handle(&self) -> &CounterControlHandle {
700        &self.control_handle
701    }
702
703    fn drop_without_shutdown(mut self) {
704        // Safety: drops once, never accessed again due to mem::forget
705        unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
706        // Prevent Drop from running (which would shut down the channel)
707        std::mem::forget(self);
708    }
709}
710
711impl CounterIncrementResponder {
712    /// Sends a response to the FIDL transaction.
713    ///
714    /// Sets the channel to shutdown if an error occurs.
715    pub fn send(self, mut value: u32) -> Result<(), fidl::Error> {
716        let _result = self.send_raw(value);
717        if _result.is_err() {
718            self.control_handle.shutdown();
719        }
720        self.drop_without_shutdown();
721        _result
722    }
723
724    /// Similar to "send" but does not shutdown the channel if an error occurs.
725    pub fn send_no_shutdown_on_err(self, mut value: u32) -> Result<(), fidl::Error> {
726        let _result = self.send_raw(value);
727        self.drop_without_shutdown();
728        _result
729    }
730
731    fn send_raw(&self, mut value: u32) -> Result<(), fidl::Error> {
732        self.control_handle.inner.send::<CounterIncrementResponse>(
733            (value,),
734            self.tx_id,
735            0x60cf610cd915d7a9,
736            fidl::encoding::DynamicFlags::empty(),
737        )
738    }
739}
740
741#[must_use = "FIDL methods require a response to be sent"]
742#[derive(Debug)]
743pub struct CounterTryOpenDirectoryResponder {
744    control_handle: std::mem::ManuallyDrop<CounterControlHandle>,
745    tx_id: u32,
746}
747
748/// Set the the channel to be shutdown (see [`CounterControlHandle::shutdown`])
749/// if the responder is dropped without sending a response, so that the client
750/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
751impl std::ops::Drop for CounterTryOpenDirectoryResponder {
752    fn drop(&mut self) {
753        self.control_handle.shutdown();
754        // Safety: drops once, never accessed again
755        unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
756    }
757}
758
759impl fidl::endpoints::Responder for CounterTryOpenDirectoryResponder {
760    type ControlHandle = CounterControlHandle;
761
762    fn control_handle(&self) -> &CounterControlHandle {
763        &self.control_handle
764    }
765
766    fn drop_without_shutdown(mut self) {
767        // Safety: drops once, never accessed again due to mem::forget
768        unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
769        // Prevent Drop from running (which would shut down the channel)
770        std::mem::forget(self);
771    }
772}
773
774impl CounterTryOpenDirectoryResponder {
775    /// Sends a response to the FIDL transaction.
776    ///
777    /// Sets the channel to shutdown if an error occurs.
778    pub fn send(self, mut result: Result<(), i32>) -> Result<(), fidl::Error> {
779        let _result = self.send_raw(result);
780        if _result.is_err() {
781            self.control_handle.shutdown();
782        }
783        self.drop_without_shutdown();
784        _result
785    }
786
787    /// Similar to "send" but does not shutdown the channel if an error occurs.
788    pub fn send_no_shutdown_on_err(self, mut result: Result<(), i32>) -> Result<(), fidl::Error> {
789        let _result = self.send_raw(result);
790        self.drop_without_shutdown();
791        _result
792    }
793
794    fn send_raw(&self, mut result: Result<(), i32>) -> Result<(), fidl::Error> {
795        self.control_handle
796            .inner
797            .send::<fidl::encoding::ResultType<fidl::encoding::EmptyStruct, i32>>(
798                result,
799                self.tx_id,
800                0x37310702b1c8b863,
801                fidl::encoding::DynamicFlags::empty(),
802            )
803    }
804}
805
806mod internal {
807    use super::*;
808
809    impl fidl::encoding::ResourceTypeMarker for CounterConnectToProtocolRequest {
810        type Borrowed<'a> = &'a mut Self;
811        fn take_or_borrow<'a>(
812            value: &'a mut <Self as fidl::encoding::TypeMarker>::Owned,
813        ) -> Self::Borrowed<'a> {
814            value
815        }
816    }
817
818    unsafe impl fidl::encoding::TypeMarker for CounterConnectToProtocolRequest {
819        type Owned = Self;
820
821        #[inline(always)]
822        fn inline_align(_context: fidl::encoding::Context) -> usize {
823            8
824        }
825
826        #[inline(always)]
827        fn inline_size(_context: fidl::encoding::Context) -> usize {
828            24
829        }
830    }
831
832    unsafe impl
833        fidl::encoding::Encode<
834            CounterConnectToProtocolRequest,
835            fidl::encoding::DefaultFuchsiaResourceDialect,
836        > for &mut CounterConnectToProtocolRequest
837    {
838        #[inline]
839        unsafe fn encode(
840            self,
841            encoder: &mut fidl::encoding::Encoder<
842                '_,
843                fidl::encoding::DefaultFuchsiaResourceDialect,
844            >,
845            offset: usize,
846            _depth: fidl::encoding::Depth,
847        ) -> fidl::Result<()> {
848            encoder.debug_check_bounds::<CounterConnectToProtocolRequest>(offset);
849            // Delegate to tuple encoding.
850            fidl::encoding::Encode::<
851                CounterConnectToProtocolRequest,
852                fidl::encoding::DefaultFuchsiaResourceDialect,
853            >::encode(
854                (
855                    <fidl::encoding::BoundedString<255> as fidl::encoding::ValueTypeMarker>::borrow(
856                        &self.protocol_name,
857                    ),
858                    <fidl::encoding::HandleType<
859                        fidl::Channel,
860                        { fidl::ObjectType::CHANNEL.into_raw() },
861                        2147483648,
862                    > as fidl::encoding::ResourceTypeMarker>::take_or_borrow(
863                        &mut self.request
864                    ),
865                ),
866                encoder,
867                offset,
868                _depth,
869            )
870        }
871    }
872    unsafe impl<
873            T0: fidl::encoding::Encode<
874                fidl::encoding::BoundedString<255>,
875                fidl::encoding::DefaultFuchsiaResourceDialect,
876            >,
877            T1: fidl::encoding::Encode<
878                fidl::encoding::HandleType<
879                    fidl::Channel,
880                    { fidl::ObjectType::CHANNEL.into_raw() },
881                    2147483648,
882                >,
883                fidl::encoding::DefaultFuchsiaResourceDialect,
884            >,
885        >
886        fidl::encoding::Encode<
887            CounterConnectToProtocolRequest,
888            fidl::encoding::DefaultFuchsiaResourceDialect,
889        > for (T0, T1)
890    {
891        #[inline]
892        unsafe fn encode(
893            self,
894            encoder: &mut fidl::encoding::Encoder<
895                '_,
896                fidl::encoding::DefaultFuchsiaResourceDialect,
897            >,
898            offset: usize,
899            depth: fidl::encoding::Depth,
900        ) -> fidl::Result<()> {
901            encoder.debug_check_bounds::<CounterConnectToProtocolRequest>(offset);
902            // Zero out padding regions. There's no need to apply masks
903            // because the unmasked parts will be overwritten by fields.
904            unsafe {
905                let ptr = encoder.buf.as_mut_ptr().add(offset).offset(16);
906                (ptr as *mut u64).write_unaligned(0);
907            }
908            // Write the fields.
909            self.0.encode(encoder, offset + 0, depth)?;
910            self.1.encode(encoder, offset + 16, depth)?;
911            Ok(())
912        }
913    }
914
915    impl fidl::encoding::Decode<Self, fidl::encoding::DefaultFuchsiaResourceDialect>
916        for CounterConnectToProtocolRequest
917    {
918        #[inline(always)]
919        fn new_empty() -> Self {
920            Self {
921                protocol_name: fidl::new_empty!(
922                    fidl::encoding::BoundedString<255>,
923                    fidl::encoding::DefaultFuchsiaResourceDialect
924                ),
925                request: fidl::new_empty!(fidl::encoding::HandleType<fidl::Channel, { fidl::ObjectType::CHANNEL.into_raw() }, 2147483648>, fidl::encoding::DefaultFuchsiaResourceDialect),
926            }
927        }
928
929        #[inline]
930        unsafe fn decode(
931            &mut self,
932            decoder: &mut fidl::encoding::Decoder<
933                '_,
934                fidl::encoding::DefaultFuchsiaResourceDialect,
935            >,
936            offset: usize,
937            _depth: fidl::encoding::Depth,
938        ) -> fidl::Result<()> {
939            decoder.debug_check_bounds::<Self>(offset);
940            // Verify that padding bytes are zero.
941            let ptr = unsafe { decoder.buf.as_ptr().add(offset).offset(16) };
942            let padval = unsafe { (ptr as *const u64).read_unaligned() };
943            let mask = 0xffffffff00000000u64;
944            let maskedval = padval & mask;
945            if maskedval != 0 {
946                return Err(fidl::Error::NonZeroPadding {
947                    padding_start: offset + 16 + ((mask as u64).trailing_zeros() / 8) as usize,
948                });
949            }
950            fidl::decode!(
951                fidl::encoding::BoundedString<255>,
952                fidl::encoding::DefaultFuchsiaResourceDialect,
953                &mut self.protocol_name,
954                decoder,
955                offset + 0,
956                _depth
957            )?;
958            fidl::decode!(fidl::encoding::HandleType<fidl::Channel, { fidl::ObjectType::CHANNEL.into_raw() }, 2147483648>, fidl::encoding::DefaultFuchsiaResourceDialect, &mut self.request, decoder, offset + 16, _depth)?;
959            Ok(())
960        }
961    }
962
963    impl fidl::encoding::ResourceTypeMarker for CounterOpenInNamespaceRequest {
964        type Borrowed<'a> = &'a mut Self;
965        fn take_or_borrow<'a>(
966            value: &'a mut <Self as fidl::encoding::TypeMarker>::Owned,
967        ) -> Self::Borrowed<'a> {
968            value
969        }
970    }
971
972    unsafe impl fidl::encoding::TypeMarker for CounterOpenInNamespaceRequest {
973        type Owned = Self;
974
975        #[inline(always)]
976        fn inline_align(_context: fidl::encoding::Context) -> usize {
977            8
978        }
979
980        #[inline(always)]
981        fn inline_size(_context: fidl::encoding::Context) -> usize {
982            32
983        }
984    }
985
986    unsafe impl
987        fidl::encoding::Encode<
988            CounterOpenInNamespaceRequest,
989            fidl::encoding::DefaultFuchsiaResourceDialect,
990        > for &mut CounterOpenInNamespaceRequest
991    {
992        #[inline]
993        unsafe fn encode(
994            self,
995            encoder: &mut fidl::encoding::Encoder<
996                '_,
997                fidl::encoding::DefaultFuchsiaResourceDialect,
998            >,
999            offset: usize,
1000            _depth: fidl::encoding::Depth,
1001        ) -> fidl::Result<()> {
1002            encoder.debug_check_bounds::<CounterOpenInNamespaceRequest>(offset);
1003            // Delegate to tuple encoding.
1004            fidl::encoding::Encode::<CounterOpenInNamespaceRequest, fidl::encoding::DefaultFuchsiaResourceDialect>::encode(
1005                (
1006                    <fidl::encoding::BoundedString<4095> as fidl::encoding::ValueTypeMarker>::borrow(&self.path),
1007                    <fidl_fuchsia_io::Flags as fidl::encoding::ValueTypeMarker>::borrow(&self.flags),
1008                    <fidl::encoding::HandleType<fidl::Channel, { fidl::ObjectType::CHANNEL.into_raw() }, 2147483648> as fidl::encoding::ResourceTypeMarker>::take_or_borrow(&mut self.request),
1009                ),
1010                encoder, offset, _depth
1011            )
1012        }
1013    }
1014    unsafe impl<
1015            T0: fidl::encoding::Encode<
1016                fidl::encoding::BoundedString<4095>,
1017                fidl::encoding::DefaultFuchsiaResourceDialect,
1018            >,
1019            T1: fidl::encoding::Encode<
1020                fidl_fuchsia_io::Flags,
1021                fidl::encoding::DefaultFuchsiaResourceDialect,
1022            >,
1023            T2: fidl::encoding::Encode<
1024                fidl::encoding::HandleType<
1025                    fidl::Channel,
1026                    { fidl::ObjectType::CHANNEL.into_raw() },
1027                    2147483648,
1028                >,
1029                fidl::encoding::DefaultFuchsiaResourceDialect,
1030            >,
1031        >
1032        fidl::encoding::Encode<
1033            CounterOpenInNamespaceRequest,
1034            fidl::encoding::DefaultFuchsiaResourceDialect,
1035        > for (T0, T1, T2)
1036    {
1037        #[inline]
1038        unsafe fn encode(
1039            self,
1040            encoder: &mut fidl::encoding::Encoder<
1041                '_,
1042                fidl::encoding::DefaultFuchsiaResourceDialect,
1043            >,
1044            offset: usize,
1045            depth: fidl::encoding::Depth,
1046        ) -> fidl::Result<()> {
1047            encoder.debug_check_bounds::<CounterOpenInNamespaceRequest>(offset);
1048            // Zero out padding regions. There's no need to apply masks
1049            // because the unmasked parts will be overwritten by fields.
1050            unsafe {
1051                let ptr = encoder.buf.as_mut_ptr().add(offset).offset(24);
1052                (ptr as *mut u64).write_unaligned(0);
1053            }
1054            // Write the fields.
1055            self.0.encode(encoder, offset + 0, depth)?;
1056            self.1.encode(encoder, offset + 16, depth)?;
1057            self.2.encode(encoder, offset + 24, depth)?;
1058            Ok(())
1059        }
1060    }
1061
1062    impl fidl::encoding::Decode<Self, fidl::encoding::DefaultFuchsiaResourceDialect>
1063        for CounterOpenInNamespaceRequest
1064    {
1065        #[inline(always)]
1066        fn new_empty() -> Self {
1067            Self {
1068                path: fidl::new_empty!(
1069                    fidl::encoding::BoundedString<4095>,
1070                    fidl::encoding::DefaultFuchsiaResourceDialect
1071                ),
1072                flags: fidl::new_empty!(
1073                    fidl_fuchsia_io::Flags,
1074                    fidl::encoding::DefaultFuchsiaResourceDialect
1075                ),
1076                request: fidl::new_empty!(fidl::encoding::HandleType<fidl::Channel, { fidl::ObjectType::CHANNEL.into_raw() }, 2147483648>, fidl::encoding::DefaultFuchsiaResourceDialect),
1077            }
1078        }
1079
1080        #[inline]
1081        unsafe fn decode(
1082            &mut self,
1083            decoder: &mut fidl::encoding::Decoder<
1084                '_,
1085                fidl::encoding::DefaultFuchsiaResourceDialect,
1086            >,
1087            offset: usize,
1088            _depth: fidl::encoding::Depth,
1089        ) -> fidl::Result<()> {
1090            decoder.debug_check_bounds::<Self>(offset);
1091            // Verify that padding bytes are zero.
1092            let ptr = unsafe { decoder.buf.as_ptr().add(offset).offset(24) };
1093            let padval = unsafe { (ptr as *const u64).read_unaligned() };
1094            let mask = 0xffffffff00000000u64;
1095            let maskedval = padval & mask;
1096            if maskedval != 0 {
1097                return Err(fidl::Error::NonZeroPadding {
1098                    padding_start: offset + 24 + ((mask as u64).trailing_zeros() / 8) as usize,
1099                });
1100            }
1101            fidl::decode!(
1102                fidl::encoding::BoundedString<4095>,
1103                fidl::encoding::DefaultFuchsiaResourceDialect,
1104                &mut self.path,
1105                decoder,
1106                offset + 0,
1107                _depth
1108            )?;
1109            fidl::decode!(
1110                fidl_fuchsia_io::Flags,
1111                fidl::encoding::DefaultFuchsiaResourceDialect,
1112                &mut self.flags,
1113                decoder,
1114                offset + 16,
1115                _depth
1116            )?;
1117            fidl::decode!(fidl::encoding::HandleType<fidl::Channel, { fidl::ObjectType::CHANNEL.into_raw() }, 2147483648>, fidl::encoding::DefaultFuchsiaResourceDialect, &mut self.request, decoder, offset + 24, _depth)?;
1118            Ok(())
1119        }
1120    }
1121}