1use crate::common::CreationMode;
6use crate::directory::DirectoryOptions;
7use crate::file::FileOptions;
8use crate::node::NodeOptions;
9use crate::service::ServiceOptions;
10use crate::symlink::SymlinkOptions;
11use fidl_fuchsia_io as fio;
12use zx_status::Status;
13
14pub trait ProtocolsExt: ToFileOptions + ToNodeOptions + Send + Sync + 'static {
16 fn is_dir_allowed(&self) -> bool;
18
19 fn is_file_allowed(&self) -> bool;
21
22 fn is_symlink_allowed(&self) -> bool;
24
25 fn creation_mode(&self) -> CreationMode;
27
28 fn rights(&self) -> Option<fio::Operations>;
32
33 fn to_directory_options(&self) -> Result<DirectoryOptions, Status>;
35
36 fn to_symlink_options(&self) -> Result<SymlinkOptions, Status>;
38
39 fn to_service_options(&self) -> Result<ServiceOptions, Status>;
41
42 fn is_append(&self) -> bool;
44
45 fn is_truncate(&self) -> bool;
47
48 fn create_directory(&self) -> bool;
50
51 fn is_node(&self) -> bool;
53
54 fn create_unnamed_temporary_in_directory_path(&self) -> bool;
56}
57
58impl ProtocolsExt for fio::OpenFlags {
59 fn is_dir_allowed(&self) -> bool {
60 !self.contains(fio::OpenFlags::NOT_DIRECTORY)
61 }
62
63 fn is_file_allowed(&self) -> bool {
64 !self.contains(fio::OpenFlags::DIRECTORY)
65 }
66
67 fn is_symlink_allowed(&self) -> bool {
68 !self.contains(fio::OpenFlags::DIRECTORY)
69 }
70
71 fn creation_mode(&self) -> CreationMode {
72 if self.contains(fio::OpenFlags::CREATE) {
73 if self.contains(fio::OpenFlags::CREATE_IF_ABSENT) {
74 CreationMode::Always
75 } else {
76 CreationMode::AllowExisting
77 }
78 } else {
79 CreationMode::Never
80 }
81 }
82
83 fn rights(&self) -> Option<fio::Operations> {
84 if self.contains(fio::OpenFlags::CLONE_SAME_RIGHTS) {
85 None
86 } else {
87 let mut rights = fio::Operations::GET_ATTRIBUTES | fio::Operations::CONNECT;
88 if self.contains(fio::OpenFlags::RIGHT_READABLE) {
89 rights |= fio::R_STAR_DIR;
90 }
91 if self.contains(fio::OpenFlags::RIGHT_WRITABLE) {
92 rights |= fio::W_STAR_DIR;
93 }
94 if self.contains(fio::OpenFlags::RIGHT_EXECUTABLE) {
95 rights |= fio::X_STAR_DIR;
96 }
97 Some(rights)
98 }
99 }
100
101 fn to_directory_options(&self) -> Result<DirectoryOptions, Status> {
107 assert!(!self.intersects(fio::OpenFlags::NODE_REFERENCE));
108
109 let mut flags = *self;
110
111 if flags.intersects(fio::OpenFlags::DIRECTORY) {
112 flags &= !fio::OpenFlags::DIRECTORY;
113 }
114
115 if flags.intersects(fio::OpenFlags::NOT_DIRECTORY) {
116 return Err(Status::NOT_FILE);
117 }
118
119 if flags.intersects(fio::OpenFlags::POSIX_EXECUTABLE) {
122 flags |= fio::OpenFlags::RIGHT_EXECUTABLE;
123 }
124 if flags.intersects(fio::OpenFlags::POSIX_WRITABLE) {
125 flags |= fio::OpenFlags::RIGHT_WRITABLE;
126 }
127 flags &= !(fio::OpenFlags::POSIX_WRITABLE | fio::OpenFlags::POSIX_EXECUTABLE);
128
129 let allowed_flags = fio::OpenFlags::DESCRIBE
130 | fio::OpenFlags::CREATE
131 | fio::OpenFlags::CREATE_IF_ABSENT
132 | fio::OpenFlags::DIRECTORY
133 | fio::OpenFlags::RIGHT_READABLE
134 | fio::OpenFlags::RIGHT_WRITABLE
135 | fio::OpenFlags::RIGHT_EXECUTABLE;
136
137 let prohibited_flags = fio::OpenFlags::APPEND | fio::OpenFlags::TRUNCATE;
138
139 if flags.intersects(prohibited_flags) {
140 return Err(Status::INVALID_ARGS);
141 }
142
143 if flags.intersects(!allowed_flags) {
144 return Err(Status::NOT_SUPPORTED);
145 }
146
147 let mut rights = fio::Rights::GET_ATTRIBUTES;
150 if flags.contains(fio::OpenFlags::RIGHT_READABLE) {
151 rights |= fio::R_STAR_DIR;
152 }
153 if flags.contains(fio::OpenFlags::RIGHT_WRITABLE) {
154 rights |= fio::W_STAR_DIR;
155 }
156 if flags.contains(fio::OpenFlags::RIGHT_EXECUTABLE) {
157 rights |= fio::X_STAR_DIR;
158 }
159
160 Ok(DirectoryOptions { rights })
161 }
162
163 fn to_symlink_options(&self) -> Result<SymlinkOptions, Status> {
164 if self.intersects(fio::OpenFlags::DIRECTORY) {
165 return Err(Status::NOT_DIR);
166 }
167
168 let optional = fio::OpenFlags::NOT_DIRECTORY
171 | fio::OpenFlags::DESCRIBE
172 | fio::OpenFlags::RIGHT_WRITABLE
173 | fio::OpenFlags::RIGHT_EXECUTABLE;
174
175 if *self & !optional != fio::OpenFlags::RIGHT_READABLE {
176 return Err(Status::INVALID_ARGS);
177 }
178
179 Ok(SymlinkOptions)
180 }
181
182 fn to_service_options(&self) -> Result<ServiceOptions, Status> {
183 if self.intersects(fio::OpenFlags::DIRECTORY) {
184 return Err(Status::NOT_DIR);
185 }
186
187 if self.intersects(!fio::OpenFlags::DESCRIBE.union(fio::OpenFlags::NOT_DIRECTORY)) {
188 return Err(Status::INVALID_ARGS);
189 }
190
191 Ok(ServiceOptions)
192 }
193
194 fn is_append(&self) -> bool {
195 self.contains(fio::OpenFlags::APPEND)
196 }
197
198 fn is_truncate(&self) -> bool {
199 self.contains(fio::OpenFlags::TRUNCATE)
200 }
201
202 fn create_directory(&self) -> bool {
203 self.contains(fio::OpenFlags::DIRECTORY)
204 }
205
206 fn is_node(&self) -> bool {
207 self.contains(fio::OpenFlags::NODE_REFERENCE)
208 }
209
210 fn create_unnamed_temporary_in_directory_path(&self) -> bool {
211 false
212 }
213}
214
215impl ProtocolsExt for fio::Flags {
216 fn is_dir_allowed(&self) -> bool {
217 self.contains(fio::Flags::PROTOCOL_DIRECTORY)
218 || self.intersection(fio::MASK_KNOWN_PROTOCOLS).is_empty()
219 }
220
221 fn is_file_allowed(&self) -> bool {
222 self.contains(fio::Flags::PROTOCOL_FILE)
223 || self.intersection(fio::MASK_KNOWN_PROTOCOLS).is_empty()
224 }
225
226 fn is_symlink_allowed(&self) -> bool {
227 self.contains(fio::Flags::PROTOCOL_SYMLINK)
228 || self.intersection(fio::MASK_KNOWN_PROTOCOLS).is_empty()
229 }
230
231 fn creation_mode(&self) -> CreationMode {
232 #[cfg(fuchsia_api_level_at_least = "HEAD")]
233 {
234 if self.contains(fio::Flags::FLAG_CREATE_AS_UNNAMED_TEMPORARY) {
235 if self.contains(fio::Flags::FLAG_MUST_CREATE) {
236 return CreationMode::UnlinkableUnnamedTemporary;
237 }
238 return CreationMode::UnnamedTemporary;
239 }
240 }
241 if self.contains(fio::Flags::FLAG_MUST_CREATE) {
242 CreationMode::Always
243 } else if self.contains(fio::Flags::FLAG_MAYBE_CREATE) {
244 CreationMode::AllowExisting
245 } else {
246 CreationMode::Never
247 }
248 }
249
250 fn rights(&self) -> Option<fio::Operations> {
251 Some(flags_to_rights(self))
252 }
253
254 fn to_directory_options(&self) -> Result<DirectoryOptions, Status> {
255 if !self.is_dir_allowed() {
257 return Err(if self.is_file_allowed() { Status::NOT_FILE } else { Status::WRONG_TYPE });
258 }
259
260 let mut updated_flags = *self;
264 if updated_flags.contains(fio::Flags::PERM_INHERIT_WRITE) {
265 updated_flags |=
266 fio::Flags::from_bits_truncate(fio::INHERITED_WRITE_PERMISSIONS.bits());
267 }
268 if updated_flags.contains(fio::Flags::PERM_INHERIT_EXECUTE) {
269 updated_flags |= fio::Flags::PERM_EXECUTE;
270 }
271
272 if updated_flags.intersects(fio::Flags::FILE_APPEND | fio::Flags::FILE_TRUNCATE) {
274 return Err(Status::INVALID_ARGS);
275 }
276
277 Ok(DirectoryOptions { rights: flags_to_rights(&updated_flags) })
278 }
279
280 fn to_symlink_options(&self) -> Result<SymlinkOptions, Status> {
281 if !self.is_symlink_allowed() {
282 return Err(Status::WRONG_TYPE);
283 }
284
285 if !self.rights().unwrap().contains(fio::Operations::GET_ATTRIBUTES) {
287 return Err(Status::INVALID_ARGS);
288 }
289 Ok(SymlinkOptions)
290 }
291
292 fn to_service_options(&self) -> Result<ServiceOptions, Status> {
293 assert!(!self.contains(fio::Flags::PROTOCOL_NODE));
296 if !self
297 .intersection(fio::MASK_KNOWN_PROTOCOLS)
298 .difference(fio::Flags::PROTOCOL_SERVICE)
299 .is_empty()
300 {
301 return if self.is_dir_allowed() {
302 Err(Status::NOT_DIR)
303 } else if self.is_file_allowed() {
304 Err(Status::NOT_FILE)
305 } else {
306 Err(Status::WRONG_TYPE)
307 };
308 }
309
310 if !self.difference(fio::Flags::PROTOCOL_SERVICE).is_empty() {
311 return Err(Status::INVALID_ARGS);
312 }
313
314 Ok(ServiceOptions)
315 }
316
317 fn is_append(&self) -> bool {
318 self.contains(fio::Flags::FILE_APPEND)
319 }
320
321 fn is_truncate(&self) -> bool {
322 self.contains(fio::Flags::FILE_TRUNCATE)
323 }
324
325 fn create_directory(&self) -> bool {
326 self.contains(fio::Flags::PROTOCOL_DIRECTORY)
327 }
328
329 fn is_node(&self) -> bool {
330 self.contains(fio::Flags::PROTOCOL_NODE)
331 }
332
333 fn create_unnamed_temporary_in_directory_path(&self) -> bool {
334 self.creation_mode() == CreationMode::UnnamedTemporary
335 || self.creation_mode() == CreationMode::UnlinkableUnnamedTemporary
336 }
337}
338
339pub trait ToFileOptions: Send + 'static {
340 fn to_file_options(&self) -> Result<FileOptions, Status>;
341}
342
343impl ToFileOptions for fio::OpenFlags {
344 fn to_file_options(&self) -> Result<FileOptions, Status> {
345 assert!(!self.intersects(fio::OpenFlags::NODE_REFERENCE));
346
347 if self.contains(fio::OpenFlags::DIRECTORY) {
348 return Err(Status::NOT_DIR);
349 }
350
351 let flags_without_rights = self.difference(
353 fio::OpenFlags::RIGHT_READABLE
354 | fio::OpenFlags::RIGHT_WRITABLE
355 | fio::OpenFlags::RIGHT_EXECUTABLE,
356 );
357 const ALLOWED_FLAGS: fio::OpenFlags = fio::OpenFlags::DESCRIBE
358 .union(fio::OpenFlags::CREATE)
359 .union(fio::OpenFlags::CREATE_IF_ABSENT)
360 .union(fio::OpenFlags::APPEND)
361 .union(fio::OpenFlags::TRUNCATE)
362 .union(fio::OpenFlags::POSIX_WRITABLE)
363 .union(fio::OpenFlags::POSIX_EXECUTABLE)
364 .union(fio::OpenFlags::NOT_DIRECTORY);
365 if flags_without_rights.intersects(!ALLOWED_FLAGS) {
366 return Err(Status::NOT_SUPPORTED);
367 }
368
369 let mut prohibited_flags = fio::OpenFlags::empty();
371 if !self.intersects(fio::OpenFlags::RIGHT_WRITABLE) {
372 prohibited_flags |= fio::OpenFlags::TRUNCATE
373 }
374 if self.intersects(prohibited_flags) {
375 return Err(Status::INVALID_ARGS);
376 }
377
378 Ok(FileOptions {
379 rights: {
380 let mut rights = fio::Operations::GET_ATTRIBUTES;
381 if self.contains(fio::OpenFlags::RIGHT_READABLE) {
382 rights |= fio::Operations::READ_BYTES;
383 }
384 if self.contains(fio::OpenFlags::RIGHT_WRITABLE) {
385 rights |= fio::Operations::WRITE_BYTES | fio::Operations::UPDATE_ATTRIBUTES;
386 }
387 if self.contains(fio::OpenFlags::RIGHT_EXECUTABLE) {
388 rights |= fio::Operations::EXECUTE;
389 }
390 rights
391 },
392 is_append: self.contains(fio::OpenFlags::APPEND),
393 #[cfg(fuchsia_api_level_at_least = "HEAD")]
394 is_linkable: true,
395 })
396 }
397}
398
399impl ToFileOptions for fio::Flags {
400 fn to_file_options(&self) -> Result<FileOptions, Status> {
401 if !self.is_file_allowed() {
403 if self.is_dir_allowed() && !self.is_symlink_allowed() {
404 return Err(Status::NOT_DIR);
405 } else {
406 return Err(Status::WRONG_TYPE);
407 }
408 }
409
410 if self.contains(fio::Flags::FILE_TRUNCATE) && !self.contains(fio::Flags::PERM_WRITE) {
412 return Err(Status::INVALID_ARGS);
413 }
414
415 const ALLOWED_RIGHTS: fio::Operations = fio::Operations::empty()
417 .union(fio::Operations::GET_ATTRIBUTES)
418 .union(fio::Operations::READ_BYTES)
419 .union(fio::Operations::WRITE_BYTES)
420 .union(fio::Operations::UPDATE_ATTRIBUTES)
421 .union(fio::Operations::EXECUTE);
422
423 Ok(FileOptions {
424 rights: flags_to_rights(self).intersection(ALLOWED_RIGHTS),
425 is_append: self.contains(fio::Flags::FILE_APPEND),
426 #[cfg(fuchsia_api_level_at_least = "HEAD")]
427 is_linkable: !self.contains(
428 fio::Flags::FLAG_CREATE_AS_UNNAMED_TEMPORARY | fio::FLAG_TEMPORARY_AS_NOT_LINKABLE,
429 ),
430 })
431 }
432}
433
434impl ToFileOptions for FileOptions {
435 fn to_file_options(&self) -> Result<FileOptions, Status> {
436 Ok(*self)
437 }
438}
439
440pub trait ToNodeOptions: Send + 'static {
441 fn to_node_options(&self, dirent_type: fio::DirentType) -> Result<NodeOptions, Status>;
442}
443
444impl ToNodeOptions for fio::OpenFlags {
445 fn to_node_options(&self, dirent_type: fio::DirentType) -> Result<NodeOptions, Status> {
446 let allowed_rights =
450 fio::OPEN_RIGHTS | fio::OpenFlags::POSIX_WRITABLE | fio::OpenFlags::POSIX_EXECUTABLE;
451 if self.intersects(!(fio::OPEN_FLAGS_ALLOWED_WITH_NODE_REFERENCE | allowed_rights)) {
452 Err(Status::INVALID_ARGS)
453 } else if self.contains(fio::OpenFlags::DIRECTORY)
454 && dirent_type != fio::DirentType::Directory
455 {
456 Err(Status::NOT_DIR)
457 } else {
458 Ok(NodeOptions { rights: fio::Operations::GET_ATTRIBUTES })
459 }
460 }
461}
462
463impl ToNodeOptions for fio::Flags {
464 fn to_node_options(&self, dirent_type: fio::DirentType) -> Result<NodeOptions, Status> {
465 const ALLOWED_FLAGS: fio::Flags = fio::Flags::FLAG_SEND_REPRESENTATION
469 .union(fio::MASK_KNOWN_PERMISSIONS)
470 .union(fio::MASK_KNOWN_PROTOCOLS);
471
472 if self.intersects(!ALLOWED_FLAGS) {
473 return Err(Status::INVALID_ARGS);
474 }
475
476 if self.intersects(fio::MASK_KNOWN_PROTOCOLS.difference(fio::Flags::PROTOCOL_NODE)) {
479 if dirent_type == fio::DirentType::Directory {
480 if !self.intersects(fio::Flags::PROTOCOL_DIRECTORY) {
481 if self.intersects(fio::Flags::PROTOCOL_FILE) {
482 return Err(Status::NOT_FILE);
483 } else {
484 return Err(Status::WRONG_TYPE);
485 }
486 }
487 } else if dirent_type == fio::DirentType::File {
488 if !self.intersects(fio::Flags::PROTOCOL_FILE) {
489 if self.intersects(fio::Flags::PROTOCOL_DIRECTORY) {
490 return Err(Status::NOT_DIR);
491 } else {
492 return Err(Status::WRONG_TYPE);
493 }
494 }
495 } else if dirent_type == fio::DirentType::Symlink {
496 if !self.intersects(fio::Flags::PROTOCOL_SYMLINK) {
497 return Err(Status::WRONG_TYPE);
498 }
499 }
500 }
501
502 Ok(NodeOptions {
503 rights: flags_to_rights(self).intersection(fio::Operations::GET_ATTRIBUTES),
504 })
505 }
506}
507
508impl ToNodeOptions for NodeOptions {
509 fn to_node_options(&self, _dirent_type: fio::DirentType) -> Result<NodeOptions, Status> {
510 Ok(*self)
511 }
512}
513
514fn flags_to_rights(flags: &fio::Flags) -> fio::Rights {
515 fio::Rights::from_bits_truncate(flags.bits())
516}