pkg_resolver_config/
config_lib_rust_config_lib_source.rs

1use fidl::unpersist;
2use fidl_cf_sc_internal_pkgresolverconfig::Config as FidlConfig;
3use fuchsia_inspect::Node;
4use fuchsia_runtime::{take_startup_handle, HandleInfo, HandleType};
5use std::convert::TryInto;
6const EXPECTED_CHECKSUM: &[u8] = &[
7    0x52, 0x0d, 0xab, 0xe2, 0xc1, 0xed, 0xd2, 0xa4, 0xf9, 0x22, 0xdb, 0xd9, 0xce, 0xf0, 0x14, 0x4b,
8    0x63, 0xd9, 0x3a, 0x26, 0x20, 0xe7, 0x55, 0x74, 0x96, 0x4f, 0x06, 0x07, 0x03, 0x48, 0xac, 0x28,
9];
10#[derive(Debug)]
11pub struct Config {
12    pub blob_download_concurrency_limit: u16,
13    pub blob_download_resumption_attempts_limit: u32,
14    pub blob_network_body_timeout_seconds: u32,
15    pub blob_network_header_timeout_seconds: u32,
16    pub delivery_blob_type: u32,
17    pub tuf_metadata_timeout_seconds: u32,
18}
19impl Config {
20    #[doc = r" Take the config startup handle and parse its contents."]
21    #[doc = r""]
22    #[doc = r" # Panics"]
23    #[doc = r""]
24    #[doc = r" If the config startup handle was already taken or if it is not valid."]
25    pub fn take_from_startup_handle() -> Self {
26        let handle_info = HandleInfo::new(HandleType::ComponentConfigVmo, 0);
27        let config_vmo: zx::Vmo =
28            take_startup_handle(handle_info).expect("Config VMO handle must be present.").into();
29        Self::from_vmo(&config_vmo).expect("Config VMO handle must be valid.")
30    }
31    #[doc = r" Parse `Self` from `vmo`."]
32    pub fn from_vmo(vmo: &zx::Vmo) -> Result<Self, Error> {
33        let config_size = vmo.get_content_size().map_err(Error::GettingContentSize)?;
34        let config_bytes = vmo.read_to_vec(0, config_size).map_err(Error::ReadingConfigBytes)?;
35        Self::from_bytes(&config_bytes)
36    }
37    #[doc = r" Parse `Self` from `bytes`."]
38    pub fn from_bytes(bytes: &[u8]) -> Result<Self, Error> {
39        let (checksum_len_bytes, bytes) = bytes.split_at_checked(2).ok_or(Error::TooFewBytes)?;
40        let checksum_len_bytes: [u8; 2] =
41            checksum_len_bytes.try_into().expect("previous call guaranteed 2 element slice");
42        let checksum_length = u16::from_le_bytes(checksum_len_bytes) as usize;
43        let (observed_checksum, bytes) =
44            bytes.split_at_checked(checksum_length).ok_or(Error::TooFewBytes)?;
45        if observed_checksum != EXPECTED_CHECKSUM {
46            return Err(Error::ChecksumMismatch { observed_checksum: observed_checksum.to_vec() });
47        }
48        let fidl_config: FidlConfig = unpersist(bytes).map_err(Error::Unpersist)?;
49        Ok(Self {
50            blob_download_concurrency_limit: fidl_config.blob_download_concurrency_limit,
51            blob_download_resumption_attempts_limit: fidl_config
52                .blob_download_resumption_attempts_limit,
53            blob_network_body_timeout_seconds: fidl_config.blob_network_body_timeout_seconds,
54            blob_network_header_timeout_seconds: fidl_config.blob_network_header_timeout_seconds,
55            delivery_blob_type: fidl_config.delivery_blob_type,
56            tuf_metadata_timeout_seconds: fidl_config.tuf_metadata_timeout_seconds,
57        })
58    }
59    pub fn record_inspect(&self, inspector_node: &Node) {
60        inspector_node.record_uint(
61            "blob_download_concurrency_limit",
62            self.blob_download_concurrency_limit as u64,
63        );
64        inspector_node.record_uint(
65            "blob_download_resumption_attempts_limit",
66            self.blob_download_resumption_attempts_limit as u64,
67        );
68        inspector_node.record_uint(
69            "blob_network_body_timeout_seconds",
70            self.blob_network_body_timeout_seconds as u64,
71        );
72        inspector_node.record_uint(
73            "blob_network_header_timeout_seconds",
74            self.blob_network_header_timeout_seconds as u64,
75        );
76        inspector_node.record_uint("delivery_blob_type", self.delivery_blob_type as u64);
77        inspector_node
78            .record_uint("tuf_metadata_timeout_seconds", self.tuf_metadata_timeout_seconds as u64);
79    }
80}
81#[derive(Debug)]
82pub enum Error {
83    #[doc = r" Failed to read the content size of the VMO."]
84    GettingContentSize(zx::Status),
85    #[doc = r" Failed to read the content of the VMO."]
86    ReadingConfigBytes(zx::Status),
87    #[doc = r" The VMO was too small for this config library."]
88    TooFewBytes,
89    #[doc = r" The VMO's config ABI checksum did not match this library's."]
90    ChecksumMismatch { observed_checksum: Vec<u8> },
91    #[doc = r" Failed to parse the non-checksum bytes of the VMO as this library's FIDL type."]
92    Unpersist(fidl::Error),
93}
94impl std::fmt::Display for Error {
95    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
96        match self {
97            Self::GettingContentSize(status) => {
98                write!(f, "Failed to get content size: {status}")
99            }
100            Self::ReadingConfigBytes(status) => {
101                write!(f, "Failed to read VMO content: {status}")
102            }
103            Self::TooFewBytes => {
104                write!(f, "VMO content is not large enough for this config library.")
105            }
106            Self::ChecksumMismatch { observed_checksum } => {
107                write!(
108                    f,
109                    "ABI checksum mismatch, expected {:?}, got {:?}",
110                    EXPECTED_CHECKSUM, observed_checksum,
111                )
112            }
113            Self::Unpersist(fidl_error) => {
114                write!(f, "Failed to parse contents of config VMO: {fidl_error}")
115            }
116        }
117    }
118}
119impl std::error::Error for Error {
120    #[allow(unused_parens, reason = "rustfmt errors without parens here")]
121    fn source(&self) -> Option<(&'_ (dyn std::error::Error + 'static))> {
122        match self {
123            Self::GettingContentSize(ref status) | Self::ReadingConfigBytes(ref status) => {
124                Some(status)
125            }
126            Self::TooFewBytes => None,
127            Self::ChecksumMismatch { .. } => None,
128            Self::Unpersist(ref fidl_error) => Some(fidl_error),
129        }
130    }
131    fn description(&self) -> &str {
132        match self {
133            Self::GettingContentSize(_) => "getting content size",
134            Self::ReadingConfigBytes(_) => "reading VMO contents",
135            Self::TooFewBytes => "VMO contents too small",
136            Self::ChecksumMismatch { .. } => "ABI checksum mismatch",
137            Self::Unpersist(_) => "FIDL parsing error",
138        }
139    }
140}