1use fidl::unpersist;
2use fidl_cf_sc_internal_pkgresolverconfig::Config as FidlConfig;
3use fuchsia_inspect::Node;
4use fuchsia_runtime::{take_startup_handle, HandleInfo, HandleType};
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7 0x52, 0x0d, 0xab, 0xe2, 0xc1, 0xed, 0xd2, 0xa4, 0xf9, 0x22, 0xdb, 0xd9, 0xce, 0xf0, 0x14, 0x4b,
8 0x63, 0xd9, 0x3a, 0x26, 0x20, 0xe7, 0x55, 0x74, 0x96, 0x4f, 0x06, 0x07, 0x03, 0x48, 0xac, 0x28,
9];
10#[derive(Debug)]
11pub struct Config {
12 pub blob_download_concurrency_limit: u16,
13 pub blob_download_resumption_attempts_limit: u32,
14 pub blob_network_body_timeout_seconds: u32,
15 pub blob_network_header_timeout_seconds: u32,
16 pub delivery_blob_type: u32,
17 pub tuf_metadata_timeout_seconds: u32,
18}
19impl Config {
20 #[doc = r" Take the config startup handle and parse its contents."]
21 #[doc = r""]
22 #[doc = r" # Panics"]
23 #[doc = r""]
24 #[doc = r" If the config startup handle was already taken or if it is not valid."]
25 pub fn take_from_startup_handle() -> Self {
26 let handle_info = HandleInfo::new(HandleType::ComponentConfigVmo, 0);
27 let config_vmo: zx::Vmo =
28 take_startup_handle(handle_info).expect("Config VMO handle must be present.").into();
29 Self::from_vmo(&config_vmo).expect("Config VMO handle must be valid.")
30 }
31 #[doc = r" Parse `Self` from `vmo`."]
32 pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
33 let config_size = vmo.get_content_size().map_err(Error::GettingContentSize)?;
34 let config_bytes = vmo.read_to_vec(0, config_size).map_err(Error::ReadingConfigBytes)?;
35 Self::from_bytes(&config_bytes)
36 }
37 #[doc = r" Parse `Self` from `bytes`."]
38 pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
39 let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
40 let checksum_len_bytes: [u8; 2] =
41 checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
42 let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
43 let (observed_checksum, bytes) =
44 bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
45 if observed_checksum != EXPECTED_CHECKSUM {
46 return Err(Error::ChecksumMismatch { observed_checksum: observed_checksum.to_vec() });
47 }
48 let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
49 Ok(Self {
50 blob_download_concurrency_limit: fidl_config.blob_download_concurrency_limit,
51 blob_download_resumption_attempts_limit: fidl_config
52 .blob_download_resumption_attempts_limit,
53 blob_network_body_timeout_seconds: fidl_config.blob_network_body_timeout_seconds,
54 blob_network_header_timeout_seconds: fidl_config.blob_network_header_timeout_seconds,
55 delivery_blob_type: fidl_config.delivery_blob_type,
56 tuf_metadata_timeout_seconds: fidl_config.tuf_metadata_timeout_seconds,
57 })
58 }
59 pub fn record_inspect(&self, inspector_node: &Node) {
60 inspector_node.record_uint(
61 "blob_download_concurrency_limit",
62 self.blob_download_concurrency_limit as u64,
63 );
64 inspector_node.record_uint(
65 "blob_download_resumption_attempts_limit",
66 self.blob_download_resumption_attempts_limit as u64,
67 );
68 inspector_node.record_uint(
69 "blob_network_body_timeout_seconds",
70 self.blob_network_body_timeout_seconds as u64,
71 );
72 inspector_node.record_uint(
73 "blob_network_header_timeout_seconds",
74 self.blob_network_header_timeout_seconds as u64,
75 );
76 inspector_node.record_uint("delivery_blob_type", self.delivery_blob_type as u64);
77 inspector_node
78 .record_uint("tuf_metadata_timeout_seconds", self.tuf_metadata_timeout_seconds as u64);
79 }
80}
81#[derive(Debug)]
82pub enum Error {
83 #[doc = r" Failed to read the content size of the VMO."]
84 GettingContentSize(zx::Status),
85 #[doc = r" Failed to read the content of the VMO."]
86 ReadingConfigBytes(zx::Status),
87 #[doc = r" The VMO was too small for this config library."]
88 TooFewBytes,
89 #[doc = r" The VMO's config ABI checksum did not match this library's."]
90 ChecksumMismatch { observed_checksum: Vec<u8> },
91 #[doc = r" Failed to parse the non-checksum bytes of the VMO as this library's FIDL type."]
92 Unpersist(fidl::Error),
93}
94impl std::fmt::Display for Error {
95 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
96 match self {
97 Self::GettingContentSize(status) => {
98 write!(f, "Failed to get content size: {status}")
99 }
100 Self::ReadingConfigBytes(status) => {
101 write!(f, "Failed to read VMO content: {status}")
102 }
103 Self::TooFewBytes => {
104 write!(f, "VMO content is not large enough for this config library.")
105 }
106 Self::ChecksumMismatch { observed_checksum } => {
107 write!(
108 f,
109 "ABI checksum mismatch, expected {:?}, got {:?}",
110 EXPECTED_CHECKSUM, observed_checksum,
111 )
112 }
113 Self::Unpersist(fidl_error) => {
114 write!(f, "Failed to parse contents of config VMO: {fidl_error}")
115 }
116 }
117 }
118}
119impl std::error::Error for Error {
120 #[allow(unused_parens, reason = "rustfmt errors without parens here")]
121 fn source(&self) -> Option<(&'_ (dyn std::error::Error + 'static))> {
122 match self {
123 Self::GettingContentSize(ref status) | Self::ReadingConfigBytes(ref status) => {
124 Some(status)
125 }
126 Self::TooFewBytes => None,
127 Self::ChecksumMismatch { .. } => None,
128 Self::Unpersist(ref fidl_error) => Some(fidl_error),
129 }
130 }
131 fn description(&self) -> &str {
132 match self {
133 Self::GettingContentSize(_) => "getting content size",
134 Self::ReadingConfigBytes(_) => "reading VMO contents",
135 Self::TooFewBytes => "VMO contents too small",
136 Self::ChecksumMismatch { .. } => "ABI checksum mismatch",
137 Self::Unpersist(_) => "FIDL parsing error",
138 }
139 }
140}