blob: f2faba262fefcfbbbb90311826b6e70edc407e43 [file] [log] [blame]
// WARNING: This file is machine generated by fidlgen.
#![allow(
unused_parens, // one-element-tuple-case is not a tuple
unused_mut, // not all args require mutation, but many do
nonstandard_style, // auto-caps does its best, but is not always successful
)]
#![recursion_limit = "512"]
#[cfg(target_os = "fuchsia")]
#[allow(unused_imports)]
use fuchsia_zircon as zx;
#[allow(unused_imports)]
use {
bitflags::bitflags,
fidl::{
client::{decode_transaction_body_fut, QueryResponseFut},
encoding::{Decodable as _, Encodable as _},
endpoints::{ControlHandle as _, Responder as _},
fidl_bits, fidl_empty_struct, fidl_enum, fidl_struct, fidl_struct_copy, fidl_table,
fidl_union, wrap_handle_metadata,
},
fuchsia_zircon_status as zx_status,
futures::future::{self, MaybeDone, TryFutureExt},
};
const _FIDL_TRACE_BINDINGS_RUST: u32 = 6;
pub const ALL_BINDINGS: u32 = 0;
pub type DenyEachBindingOnlyDenyCppResult = Result<(i32), u32>;
/// Handle-type validating wrapper for DenyEachBindingOnlyDenyCppResult responses, used internally by
/// FIDL bindings to decode method results. This should only be used by
/// generated APIs, API users should never need to use this type. It is public
/// because it is shared with composed protocols.
#[doc(hidden)]
pub type DenyEachBindingOnlyDenyCppResultHandleWrapper = Result<(i32,), u32>;
pub type DenyEachBindingOnlyDenyDartResult = Result<(i32), u32>;
/// Handle-type validating wrapper for DenyEachBindingOnlyDenyDartResult responses, used internally by
/// FIDL bindings to decode method results. This should only be used by
/// generated APIs, API users should never need to use this type. It is public
/// because it is shared with composed protocols.
#[doc(hidden)]
pub type DenyEachBindingOnlyDenyDartResultHandleWrapper = Result<(i32,), u32>;
pub type DenyEachBindingOnlyDenyGoResult = Result<(i32), u32>;
/// Handle-type validating wrapper for DenyEachBindingOnlyDenyGoResult responses, used internally by
/// FIDL bindings to decode method results. This should only be used by
/// generated APIs, API users should never need to use this type. It is public
/// because it is shared with composed protocols.
#[doc(hidden)]
pub type DenyEachBindingOnlyDenyGoResultHandleWrapper = Result<(i32,), u32>;
pub type DenyEachBindingOnlyDenyLibfuzzerResult = Result<(i32), u32>;
/// Handle-type validating wrapper for DenyEachBindingOnlyDenyLibfuzzerResult responses, used internally by
/// FIDL bindings to decode method results. This should only be used by
/// generated APIs, API users should never need to use this type. It is public
/// because it is shared with composed protocols.
#[doc(hidden)]
pub type DenyEachBindingOnlyDenyLibfuzzerResultHandleWrapper = Result<(i32,), u32>;
pub type DenyEachBindingOnlyDenySyzkallerResult = Result<(i32), u32>;
/// Handle-type validating wrapper for DenyEachBindingOnlyDenySyzkallerResult responses, used internally by
/// FIDL bindings to decode method results. This should only be used by
/// generated APIs, API users should never need to use this type. It is public
/// because it is shared with composed protocols.
#[doc(hidden)]
pub type DenyEachBindingOnlyDenySyzkallerResultHandleWrapper = Result<(i32,), u32>;
#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
pub struct MemberOnlyAppearsInImportingLibrary {
pub a: bool,
}
impl fidl::encoding::Persistable for MemberOnlyAppearsInImportingLibrary {}
fidl_struct! {
name: MemberOnlyAppearsInImportingLibrary,
members: [
a {
ty: bool,
offset_v1: 0,
offset_v2: 0,
},
],
padding_v1: [],
padding_v2: [],
size_v1: 1,
size_v2: 1,
align_v1: 1,
align_v2: 1,
}
#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
pub struct OnlyAppearsInImportingLibrary {
pub member_only_appears_in_importing_library: MemberOnlyAppearsInImportingLibrary,
}
impl fidl::encoding::Persistable for OnlyAppearsInImportingLibrary {}
fidl_struct! {
name: OnlyAppearsInImportingLibrary,
members: [
member_only_appears_in_importing_library {
ty: MemberOnlyAppearsInImportingLibrary,
offset_v1: 0,
offset_v2: 0,
},
],
padding_v1: [],
padding_v2: [],
size_v1: 1,
size_v2: 1,
align_v1: 1,
align_v2: 1,
}
#[derive(Debug, Clone, PartialEq)]
pub struct OnlyRust {
/// (FIDL-generated) Unknown fields encountered during decoding, stored as a
/// map from ordinals to raw data. The `Some` case is always nonempty.
pub unknown_data: Option<std::collections::BTreeMap<u64, Vec<u8>>>,
#[deprecated = "Use `..OnlyRust::EMPTY` to construct and `..` to match."]
#[doc(hidden)]
pub __non_exhaustive: (),
}
impl OnlyRust {
/// An empty table with every field set to `None`.
#[allow(deprecated)]
pub const EMPTY: Self = Self { unknown_data: None, __non_exhaustive: () };
}
impl fidl::encoding::Persistable for OnlyRust {}
fidl_table! {
name: OnlyRust,
members: [
],
value_unknown_member: unknown_data,
}
#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
pub struct AllowedMarker;
impl fidl::endpoints::ProtocolMarker for AllowedMarker {
type Proxy = AllowedProxy;
type RequestStream = AllowedRequestStream;
const DEBUG_NAME: &'static str = "(anonymous) Allowed";
}
pub trait AllowedProxyInterface: Send + Sync {}
#[derive(Debug)]
#[cfg(target_os = "fuchsia")]
pub struct AllowedSynchronousProxy {
client: fidl::client::sync::Client,
}
#[cfg(target_os = "fuchsia")]
impl AllowedSynchronousProxy {
pub fn new(channel: fidl::Channel) -> Self {
let protocol_name = <AllowedMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
Self { client: fidl::client::sync::Client::new(channel, protocol_name) }
}
pub fn into_channel(self) -> fidl::Channel {
self.client.into_channel()
}
/// Waits until an event arrives and returns it. It is safe for other
/// threads to make concurrent requests while waiting for an event.
pub fn wait_for_event(&self, deadline: zx::Time) -> Result<AllowedEvent, fidl::Error> {
AllowedEvent::decode(self.client.wait_for_event(deadline)?)
}
}
#[derive(Debug, Clone)]
pub struct AllowedProxy {
client: fidl::client::Client,
}
impl fidl::endpoints::Proxy for AllowedProxy {
type Protocol = AllowedMarker;
fn from_channel(inner: fidl::AsyncChannel) -> Self {
Self::new(inner)
}
fn into_channel(self) -> Result<::fidl::AsyncChannel, Self> {
self.client.into_channel().map_err(|client| Self { client })
}
fn as_channel(&self) -> &::fidl::AsyncChannel {
self.client.as_channel()
}
}
impl AllowedProxy {
/// Create a new Proxy for Allowed
pub fn new(channel: fidl::AsyncChannel) -> Self {
let protocol_name = <AllowedMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
Self { client: fidl::client::Client::new(channel, protocol_name) }
}
/// Get a Stream of events from the remote end of the Allowed protocol
///
/// # Panics
///
/// Panics if the event stream was already taken.
pub fn take_event_stream(&self) -> AllowedEventStream {
AllowedEventStream { event_receiver: self.client.take_event_receiver() }
}
}
impl AllowedProxyInterface for AllowedProxy {}
pub struct AllowedEventStream {
event_receiver: fidl::client::EventReceiver,
}
impl std::marker::Unpin for AllowedEventStream {}
impl futures::stream::FusedStream for AllowedEventStream {
fn is_terminated(&self) -> bool {
self.event_receiver.is_terminated()
}
}
impl futures::Stream for AllowedEventStream {
type Item = Result<AllowedEvent, fidl::Error>;
fn poll_next(
mut self: std::pin::Pin<&mut Self>,
cx: &mut std::task::Context<'_>,
) -> std::task::Poll<Option<Self::Item>> {
let buf = match futures::ready!(futures::stream::StreamExt::poll_next_unpin(
&mut self.event_receiver,
cx
)?) {
Some(buf) => buf,
None => return std::task::Poll::Ready(None),
};
std::task::Poll::Ready(Some(AllowedEvent::decode(buf)))
}
}
#[derive(Debug)]
pub enum AllowedEvent {}
impl AllowedEvent {
fn decode(mut buf: fidl::MessageBufEtc) -> Result<AllowedEvent, fidl::Error> {
let (bytes, _handles) = buf.split_mut();
let (tx_header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
match tx_header.ordinal() {
_ => Err(fidl::Error::UnknownOrdinal {
ordinal: tx_header.ordinal(),
protocol_name: <AllowedMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
}),
}
}
}
/// A Stream of incoming requests for Allowed
pub struct AllowedRequestStream {
inner: std::sync::Arc<fidl::ServeInner>,
is_terminated: bool,
}
impl std::marker::Unpin for AllowedRequestStream {}
impl futures::stream::FusedStream for AllowedRequestStream {
fn is_terminated(&self) -> bool {
self.is_terminated
}
}
impl fidl::endpoints::RequestStream for AllowedRequestStream {
type Protocol = AllowedMarker;
type ControlHandle = AllowedControlHandle;
fn from_channel(channel: fidl::AsyncChannel) -> Self {
Self { inner: std::sync::Arc::new(fidl::ServeInner::new(channel)), is_terminated: false }
}
fn control_handle(&self) -> Self::ControlHandle {
AllowedControlHandle { inner: self.inner.clone() }
}
fn into_inner(self) -> (::std::sync::Arc<fidl::ServeInner>, bool) {
(self.inner, self.is_terminated)
}
fn from_inner(inner: std::sync::Arc<fidl::ServeInner>, is_terminated: bool) -> Self {
Self { inner, is_terminated }
}
}
impl futures::Stream for AllowedRequestStream {
type Item = Result<AllowedRequest, fidl::Error>;
fn poll_next(
mut self: std::pin::Pin<&mut Self>,
cx: &mut std::task::Context<'_>,
) -> std::task::Poll<Option<Self::Item>> {
let this = &mut *self;
if this.inner.poll_shutdown(cx) {
this.is_terminated = true;
return std::task::Poll::Ready(None);
}
if this.is_terminated {
panic!("polled AllowedRequestStream after completion");
}
fidl::encoding::with_tls_decode_buf(|bytes, handles| {
match this.inner.channel().read_etc(cx, bytes, handles) {
std::task::Poll::Ready(Ok(())) => {}
std::task::Poll::Pending => return std::task::Poll::Pending,
std::task::Poll::Ready(Err(zx_status::Status::PEER_CLOSED)) => {
this.is_terminated = true;
return std::task::Poll::Ready(None);
}
std::task::Poll::Ready(Err(e)) => {
return std::task::Poll::Ready(Some(Err(fidl::Error::ServerRequestRead(e))))
}
}
// A message has been received from the channel
let (header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
if !header.is_compatible() {
return std::task::Poll::Ready(Some(Err(fidl::Error::IncompatibleMagicNumber(
header.magic_number(),
))));
}
std::task::Poll::Ready(Some(match header.ordinal() {
_ => Err(fidl::Error::UnknownOrdinal {
ordinal: header.ordinal(),
protocol_name: <AllowedMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
}),
}))
})
}
}
#[derive(Debug)]
pub enum AllowedRequest {}
impl AllowedRequest {
/// Name of the method defined in FIDL
pub fn method_name(&self) -> &'static str {
match *self {}
}
}
#[derive(Debug, Clone)]
pub struct AllowedControlHandle {
inner: std::sync::Arc<fidl::ServeInner>,
}
impl fidl::endpoints::ControlHandle for AllowedControlHandle {
fn shutdown(&self) {
self.inner.shutdown()
}
fn shutdown_with_epitaph(&self, status: zx_status::Status) {
self.inner.shutdown_with_epitaph(status)
}
}
impl AllowedControlHandle {}
#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
pub struct DenyEachBindingMarker;
impl fidl::endpoints::ProtocolMarker for DenyEachBindingMarker {
type Proxy = DenyEachBindingProxy;
type RequestStream = DenyEachBindingRequestStream;
const DEBUG_NAME: &'static str = "(anonymous) DenyEachBinding";
}
pub trait DenyEachBindingProxyInterface: Send + Sync {
type OnlyDenyCppResponseFut: std::future::Future<Output = Result<(DenyEachBindingOnlyDenyCppResult), fidl::Error>>
+ Send;
fn r#only_deny_cpp(&self, a: bool) -> Self::OnlyDenyCppResponseFut;
type OnlyDenyDartResponseFut: std::future::Future<Output = Result<(DenyEachBindingOnlyDenyDartResult), fidl::Error>>
+ Send;
fn r#only_deny_dart(&self, a: bool) -> Self::OnlyDenyDartResponseFut;
type OnlyDenyGoResponseFut: std::future::Future<Output = Result<(DenyEachBindingOnlyDenyGoResult), fidl::Error>>
+ Send;
fn r#only_deny_go(&self, a: bool) -> Self::OnlyDenyGoResponseFut;
type OnlyDenyLibfuzzerResponseFut: std::future::Future<Output = Result<(DenyEachBindingOnlyDenyLibfuzzerResult), fidl::Error>>
+ Send;
fn r#only_deny_libfuzzer(&self, a: bool) -> Self::OnlyDenyLibfuzzerResponseFut;
type OnlyDenySyzkallerResponseFut: std::future::Future<Output = Result<(DenyEachBindingOnlyDenySyzkallerResult), fidl::Error>>
+ Send;
fn r#only_deny_syzkaller(&self, a: bool) -> Self::OnlyDenySyzkallerResponseFut;
}
#[derive(Debug)]
#[cfg(target_os = "fuchsia")]
pub struct DenyEachBindingSynchronousProxy {
client: fidl::client::sync::Client,
}
#[cfg(target_os = "fuchsia")]
impl DenyEachBindingSynchronousProxy {
pub fn new(channel: fidl::Channel) -> Self {
let protocol_name = <DenyEachBindingMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
Self { client: fidl::client::sync::Client::new(channel, protocol_name) }
}
pub fn into_channel(self) -> fidl::Channel {
self.client.into_channel()
}
/// Waits until an event arrives and returns it. It is safe for other
/// threads to make concurrent requests while waiting for an event.
pub fn wait_for_event(&self, deadline: zx::Time) -> Result<DenyEachBindingEvent, fidl::Error> {
DenyEachBindingEvent::decode(self.client.wait_for_event(deadline)?)
}
pub fn r#only_deny_cpp(
&self,
mut a: bool,
___deadline: zx::Time,
) -> Result<(DenyEachBindingOnlyDenyCppResult), fidl::Error> {
let _value: DenyEachBindingOnlyDenyCppResultHandleWrapper = self.client.send_query(
&mut (a),
0x290bad96051b1b92,
fidl::encoding::DynamicFlags::empty(),
___deadline,
)?;
Ok(_value.map(|_value| _value.0))
}
pub fn r#only_deny_dart(
&self,
mut a: bool,
___deadline: zx::Time,
) -> Result<(DenyEachBindingOnlyDenyDartResult), fidl::Error> {
let _value: DenyEachBindingOnlyDenyDartResultHandleWrapper = self.client.send_query(
&mut (a),
0x75384066a26d87d7,
fidl::encoding::DynamicFlags::empty(),
___deadline,
)?;
Ok(_value.map(|_value| _value.0))
}
pub fn r#only_deny_go(
&self,
mut a: bool,
___deadline: zx::Time,
) -> Result<(DenyEachBindingOnlyDenyGoResult), fidl::Error> {
let _value: DenyEachBindingOnlyDenyGoResultHandleWrapper = self.client.send_query(
&mut (a),
0x657655b981478d99,
fidl::encoding::DynamicFlags::empty(),
___deadline,
)?;
Ok(_value.map(|_value| _value.0))
}
pub fn r#only_deny_libfuzzer(
&self,
mut a: bool,
___deadline: zx::Time,
) -> Result<(DenyEachBindingOnlyDenyLibfuzzerResult), fidl::Error> {
let _value: DenyEachBindingOnlyDenyLibfuzzerResultHandleWrapper = self.client.send_query(
&mut (a),
0x1e4f89c329617b1e,
fidl::encoding::DynamicFlags::empty(),
___deadline,
)?;
Ok(_value.map(|_value| _value.0))
}
pub fn r#only_deny_syzkaller(
&self,
mut a: bool,
___deadline: zx::Time,
) -> Result<(DenyEachBindingOnlyDenySyzkallerResult), fidl::Error> {
let _value: DenyEachBindingOnlyDenySyzkallerResultHandleWrapper = self.client.send_query(
&mut (a),
0x202ee614a749e98a,
fidl::encoding::DynamicFlags::empty(),
___deadline,
)?;
Ok(_value.map(|_value| _value.0))
}
}
#[derive(Debug, Clone)]
pub struct DenyEachBindingProxy {
client: fidl::client::Client,
}
impl fidl::endpoints::Proxy for DenyEachBindingProxy {
type Protocol = DenyEachBindingMarker;
fn from_channel(inner: fidl::AsyncChannel) -> Self {
Self::new(inner)
}
fn into_channel(self) -> Result<::fidl::AsyncChannel, Self> {
self.client.into_channel().map_err(|client| Self { client })
}
fn as_channel(&self) -> &::fidl::AsyncChannel {
self.client.as_channel()
}
}
impl DenyEachBindingProxy {
/// Create a new Proxy for DenyEachBinding
pub fn new(channel: fidl::AsyncChannel) -> Self {
let protocol_name = <DenyEachBindingMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
Self { client: fidl::client::Client::new(channel, protocol_name) }
}
/// Get a Stream of events from the remote end of the DenyEachBinding protocol
///
/// # Panics
///
/// Panics if the event stream was already taken.
pub fn take_event_stream(&self) -> DenyEachBindingEventStream {
DenyEachBindingEventStream { event_receiver: self.client.take_event_receiver() }
}
pub fn r#only_deny_cpp(
&self,
mut a: bool,
) -> fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyCppResult)> {
DenyEachBindingProxyInterface::r#only_deny_cpp(self, a)
}
pub fn r#only_deny_dart(
&self,
mut a: bool,
) -> fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyDartResult)> {
DenyEachBindingProxyInterface::r#only_deny_dart(self, a)
}
pub fn r#only_deny_go(
&self,
mut a: bool,
) -> fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyGoResult)> {
DenyEachBindingProxyInterface::r#only_deny_go(self, a)
}
pub fn r#only_deny_libfuzzer(
&self,
mut a: bool,
) -> fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyLibfuzzerResult)> {
DenyEachBindingProxyInterface::r#only_deny_libfuzzer(self, a)
}
pub fn r#only_deny_syzkaller(
&self,
mut a: bool,
) -> fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenySyzkallerResult)> {
DenyEachBindingProxyInterface::r#only_deny_syzkaller(self, a)
}
}
impl DenyEachBindingProxyInterface for DenyEachBindingProxy {
type OnlyDenyCppResponseFut =
fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyCppResult)>;
fn r#only_deny_cpp(&self, mut a: bool) -> Self::OnlyDenyCppResponseFut {
fn transform(
result: Result<DenyEachBindingOnlyDenyCppResultHandleWrapper, fidl::Error>,
) -> Result<(DenyEachBindingOnlyDenyCppResult), fidl::Error> {
result.map(|_value| _value.map(|_value| _value.0))
}
let send_result = self.client.call_send_raw_query(
&mut (a),
0x290bad96051b1b92,
fidl::encoding::DynamicFlags::empty(),
);
QueryResponseFut(match send_result {
Ok(res_fut) => future::maybe_done(
res_fut.and_then(|buf| decode_transaction_body_fut(buf, transform)),
),
Err(e) => MaybeDone::Done(Err(e)),
})
}
type OnlyDenyDartResponseFut =
fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyDartResult)>;
fn r#only_deny_dart(&self, mut a: bool) -> Self::OnlyDenyDartResponseFut {
fn transform(
result: Result<DenyEachBindingOnlyDenyDartResultHandleWrapper, fidl::Error>,
) -> Result<(DenyEachBindingOnlyDenyDartResult), fidl::Error> {
result.map(|_value| _value.map(|_value| _value.0))
}
let send_result = self.client.call_send_raw_query(
&mut (a),
0x75384066a26d87d7,
fidl::encoding::DynamicFlags::empty(),
);
QueryResponseFut(match send_result {
Ok(res_fut) => future::maybe_done(
res_fut.and_then(|buf| decode_transaction_body_fut(buf, transform)),
),
Err(e) => MaybeDone::Done(Err(e)),
})
}
type OnlyDenyGoResponseFut = fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyGoResult)>;
fn r#only_deny_go(&self, mut a: bool) -> Self::OnlyDenyGoResponseFut {
fn transform(
result: Result<DenyEachBindingOnlyDenyGoResultHandleWrapper, fidl::Error>,
) -> Result<(DenyEachBindingOnlyDenyGoResult), fidl::Error> {
result.map(|_value| _value.map(|_value| _value.0))
}
let send_result = self.client.call_send_raw_query(
&mut (a),
0x657655b981478d99,
fidl::encoding::DynamicFlags::empty(),
);
QueryResponseFut(match send_result {
Ok(res_fut) => future::maybe_done(
res_fut.and_then(|buf| decode_transaction_body_fut(buf, transform)),
),
Err(e) => MaybeDone::Done(Err(e)),
})
}
type OnlyDenyLibfuzzerResponseFut =
fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenyLibfuzzerResult)>;
fn r#only_deny_libfuzzer(&self, mut a: bool) -> Self::OnlyDenyLibfuzzerResponseFut {
fn transform(
result: Result<DenyEachBindingOnlyDenyLibfuzzerResultHandleWrapper, fidl::Error>,
) -> Result<(DenyEachBindingOnlyDenyLibfuzzerResult), fidl::Error> {
result.map(|_value| _value.map(|_value| _value.0))
}
let send_result = self.client.call_send_raw_query(
&mut (a),
0x1e4f89c329617b1e,
fidl::encoding::DynamicFlags::empty(),
);
QueryResponseFut(match send_result {
Ok(res_fut) => future::maybe_done(
res_fut.and_then(|buf| decode_transaction_body_fut(buf, transform)),
),
Err(e) => MaybeDone::Done(Err(e)),
})
}
type OnlyDenySyzkallerResponseFut =
fidl::client::QueryResponseFut<(DenyEachBindingOnlyDenySyzkallerResult)>;
fn r#only_deny_syzkaller(&self, mut a: bool) -> Self::OnlyDenySyzkallerResponseFut {
fn transform(
result: Result<DenyEachBindingOnlyDenySyzkallerResultHandleWrapper, fidl::Error>,
) -> Result<(DenyEachBindingOnlyDenySyzkallerResult), fidl::Error> {
result.map(|_value| _value.map(|_value| _value.0))
}
let send_result = self.client.call_send_raw_query(
&mut (a),
0x202ee614a749e98a,
fidl::encoding::DynamicFlags::empty(),
);
QueryResponseFut(match send_result {
Ok(res_fut) => future::maybe_done(
res_fut.and_then(|buf| decode_transaction_body_fut(buf, transform)),
),
Err(e) => MaybeDone::Done(Err(e)),
})
}
}
pub struct DenyEachBindingEventStream {
event_receiver: fidl::client::EventReceiver,
}
impl std::marker::Unpin for DenyEachBindingEventStream {}
impl futures::stream::FusedStream for DenyEachBindingEventStream {
fn is_terminated(&self) -> bool {
self.event_receiver.is_terminated()
}
}
impl futures::Stream for DenyEachBindingEventStream {
type Item = Result<DenyEachBindingEvent, fidl::Error>;
fn poll_next(
mut self: std::pin::Pin<&mut Self>,
cx: &mut std::task::Context<'_>,
) -> std::task::Poll<Option<Self::Item>> {
let buf = match futures::ready!(futures::stream::StreamExt::poll_next_unpin(
&mut self.event_receiver,
cx
)?) {
Some(buf) => buf,
None => return std::task::Poll::Ready(None),
};
std::task::Poll::Ready(Some(DenyEachBindingEvent::decode(buf)))
}
}
#[derive(Debug)]
pub enum DenyEachBindingEvent {}
impl DenyEachBindingEvent {
fn decode(mut buf: fidl::MessageBufEtc) -> Result<DenyEachBindingEvent, fidl::Error> {
let (bytes, _handles) = buf.split_mut();
let (tx_header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
match tx_header.ordinal() {
_ => Err(fidl::Error::UnknownOrdinal {
ordinal: tx_header.ordinal(),
protocol_name:
<DenyEachBindingMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
}),
}
}
}
/// A Stream of incoming requests for DenyEachBinding
pub struct DenyEachBindingRequestStream {
inner: std::sync::Arc<fidl::ServeInner>,
is_terminated: bool,
}
impl std::marker::Unpin for DenyEachBindingRequestStream {}
impl futures::stream::FusedStream for DenyEachBindingRequestStream {
fn is_terminated(&self) -> bool {
self.is_terminated
}
}
impl fidl::endpoints::RequestStream for DenyEachBindingRequestStream {
type Protocol = DenyEachBindingMarker;
type ControlHandle = DenyEachBindingControlHandle;
fn from_channel(channel: fidl::AsyncChannel) -> Self {
Self { inner: std::sync::Arc::new(fidl::ServeInner::new(channel)), is_terminated: false }
}
fn control_handle(&self) -> Self::ControlHandle {
DenyEachBindingControlHandle { inner: self.inner.clone() }
}
fn into_inner(self) -> (::std::sync::Arc<fidl::ServeInner>, bool) {
(self.inner, self.is_terminated)
}
fn from_inner(inner: std::sync::Arc<fidl::ServeInner>, is_terminated: bool) -> Self {
Self { inner, is_terminated }
}
}
impl futures::Stream for DenyEachBindingRequestStream {
type Item = Result<DenyEachBindingRequest, fidl::Error>;
fn poll_next(
mut self: std::pin::Pin<&mut Self>,
cx: &mut std::task::Context<'_>,
) -> std::task::Poll<Option<Self::Item>> {
let this = &mut *self;
if this.inner.poll_shutdown(cx) {
this.is_terminated = true;
return std::task::Poll::Ready(None);
}
if this.is_terminated {
panic!("polled DenyEachBindingRequestStream after completion");
}
fidl::encoding::with_tls_decode_buf(|bytes, handles| {
match this.inner.channel().read_etc(cx, bytes, handles) {
std::task::Poll::Ready(Ok(())) => {}
std::task::Poll::Pending => return std::task::Poll::Pending,
std::task::Poll::Ready(Err(zx_status::Status::PEER_CLOSED)) => {
this.is_terminated = true;
return std::task::Poll::Ready(None);
}
std::task::Poll::Ready(Err(e)) => {
return std::task::Poll::Ready(Some(Err(fidl::Error::ServerRequestRead(e))))
}
}
// A message has been received from the channel
let (header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
if !header.is_compatible() {
return std::task::Poll::Ready(Some(Err(fidl::Error::IncompatibleMagicNumber(
header.magic_number(),
))));
}
std::task::Poll::Ready(Some(match header.ordinal() {
0x290bad96051b1b92 => {
let mut req: (bool,) = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyCppRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = DenyEachBindingControlHandle { inner: this.inner.clone() };
Ok(DenyEachBindingRequest::OnlyDenyCpp {
a: req.0,
responder: DenyEachBindingOnlyDenyCppResponder {
control_handle: std::mem::ManuallyDrop::new(control_handle),
tx_id: header.tx_id(),
ordinal: header.ordinal(),
},
})
}
0x75384066a26d87d7 => {
let mut req: (bool,) = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyDartRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = DenyEachBindingControlHandle { inner: this.inner.clone() };
Ok(DenyEachBindingRequest::OnlyDenyDart {
a: req.0,
responder: DenyEachBindingOnlyDenyDartResponder {
control_handle: std::mem::ManuallyDrop::new(control_handle),
tx_id: header.tx_id(),
ordinal: header.ordinal(),
},
})
}
0x657655b981478d99 => {
let mut req: (bool,) = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyGoRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = DenyEachBindingControlHandle { inner: this.inner.clone() };
Ok(DenyEachBindingRequest::OnlyDenyGo {
a: req.0,
responder: DenyEachBindingOnlyDenyGoResponder {
control_handle: std::mem::ManuallyDrop::new(control_handle),
tx_id: header.tx_id(),
ordinal: header.ordinal(),
},
})
}
0x1e4f89c329617b1e => {
let mut req: (bool,) = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyLibfuzzerRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = DenyEachBindingControlHandle { inner: this.inner.clone() };
Ok(DenyEachBindingRequest::OnlyDenyLibfuzzer {
a: req.0,
responder: DenyEachBindingOnlyDenyLibfuzzerResponder {
control_handle: std::mem::ManuallyDrop::new(control_handle),
tx_id: header.tx_id(),
ordinal: header.ordinal(),
},
})
}
0x202ee614a749e98a => {
let mut req: (bool,) = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenySyzkallerRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = DenyEachBindingControlHandle { inner: this.inner.clone() };
Ok(DenyEachBindingRequest::OnlyDenySyzkaller {
a: req.0,
responder: DenyEachBindingOnlyDenySyzkallerResponder {
control_handle: std::mem::ManuallyDrop::new(control_handle),
tx_id: header.tx_id(),
ordinal: header.ordinal(),
},
})
}
_ => Err(fidl::Error::UnknownOrdinal {
ordinal: header.ordinal(),
protocol_name:
<DenyEachBindingMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
}),
}))
})
}
}
#[derive(Debug)]
pub enum DenyEachBindingRequest {
OnlyDenyCpp { a: bool, responder: DenyEachBindingOnlyDenyCppResponder },
OnlyDenyDart { a: bool, responder: DenyEachBindingOnlyDenyDartResponder },
OnlyDenyGo { a: bool, responder: DenyEachBindingOnlyDenyGoResponder },
OnlyDenyLibfuzzer { a: bool, responder: DenyEachBindingOnlyDenyLibfuzzerResponder },
OnlyDenySyzkaller { a: bool, responder: DenyEachBindingOnlyDenySyzkallerResponder },
}
impl DenyEachBindingRequest {
#[allow(irrefutable_let_patterns)]
pub fn into_only_deny_cpp(self) -> Option<(bool, DenyEachBindingOnlyDenyCppResponder)> {
if let DenyEachBindingRequest::OnlyDenyCpp { a, responder } = self {
Some((a, responder))
} else {
None
}
}
#[allow(irrefutable_let_patterns)]
pub fn into_only_deny_dart(self) -> Option<(bool, DenyEachBindingOnlyDenyDartResponder)> {
if let DenyEachBindingRequest::OnlyDenyDart { a, responder } = self {
Some((a, responder))
} else {
None
}
}
#[allow(irrefutable_let_patterns)]
pub fn into_only_deny_go(self) -> Option<(bool, DenyEachBindingOnlyDenyGoResponder)> {
if let DenyEachBindingRequest::OnlyDenyGo { a, responder } = self {
Some((a, responder))
} else {
None
}
}
#[allow(irrefutable_let_patterns)]
pub fn into_only_deny_libfuzzer(
self,
) -> Option<(bool, DenyEachBindingOnlyDenyLibfuzzerResponder)> {
if let DenyEachBindingRequest::OnlyDenyLibfuzzer { a, responder } = self {
Some((a, responder))
} else {
None
}
}
#[allow(irrefutable_let_patterns)]
pub fn into_only_deny_syzkaller(
self,
) -> Option<(bool, DenyEachBindingOnlyDenySyzkallerResponder)> {
if let DenyEachBindingRequest::OnlyDenySyzkaller { a, responder } = self {
Some((a, responder))
} else {
None
}
}
/// Name of the method defined in FIDL
pub fn method_name(&self) -> &'static str {
match *self {
DenyEachBindingRequest::OnlyDenyCpp { .. } => "only_deny_cpp",
DenyEachBindingRequest::OnlyDenyDart { .. } => "only_deny_dart",
DenyEachBindingRequest::OnlyDenyGo { .. } => "only_deny_go",
DenyEachBindingRequest::OnlyDenyLibfuzzer { .. } => "only_deny_libfuzzer",
DenyEachBindingRequest::OnlyDenySyzkaller { .. } => "only_deny_syzkaller",
}
}
}
#[derive(Debug, Clone)]
pub struct DenyEachBindingControlHandle {
inner: std::sync::Arc<fidl::ServeInner>,
}
impl fidl::endpoints::ControlHandle for DenyEachBindingControlHandle {
fn shutdown(&self) {
self.inner.shutdown()
}
fn shutdown_with_epitaph(&self, status: zx_status::Status) {
self.inner.shutdown_with_epitaph(status)
}
}
impl DenyEachBindingControlHandle {}
#[must_use = "FIDL methods require a response to be sent"]
#[derive(Debug)]
pub struct DenyEachBindingOnlyDenyCppResponder {
control_handle: std::mem::ManuallyDrop<DenyEachBindingControlHandle>,
tx_id: u32,
ordinal: u64,
}
/// Set the the channel to be shutdown (see [`DenyEachBindingControlHandle::shutdown`])
/// if the responder is dropped without sending a response, so that the client
/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
impl std::ops::Drop for DenyEachBindingOnlyDenyCppResponder {
fn drop(&mut self) {
self.control_handle.shutdown();
// Safety: drops once, never accessed again
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
}
}
impl fidl::endpoints::Responder for DenyEachBindingOnlyDenyCppResponder {
type ControlHandle = DenyEachBindingControlHandle;
fn control_handle(&self) -> &DenyEachBindingControlHandle {
&self.control_handle
}
fn drop_without_shutdown(mut self) {
// Safety: drops once, never accessed again due to mem::forget
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
// Prevent Drop from running (which would shut down the channel)
std::mem::forget(self);
}
}
impl DenyEachBindingOnlyDenyCppResponder {
/// Sends a response to the FIDL transaction.
///
/// Sets the channel to shutdown if an error occurs.
pub fn send(
self,
mut result: &mut DenyEachBindingOnlyDenyCppResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
if r.is_err() {
self.control_handle.shutdown();
}
self.drop_without_shutdown();
r
}
/// Similar to "send" but does not shutdown the channel if
/// an error occurs.
pub fn send_no_shutdown_on_err(
self,
mut result: &mut DenyEachBindingOnlyDenyCppResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
self.drop_without_shutdown();
r
}
fn send_raw(
&self,
mut _result: &mut DenyEachBindingOnlyDenyCppResult,
) -> Result<(), fidl::Error> {
let mut response = (_result);
let mut msg = fidl::encoding::TransactionMessage {
header: fidl::encoding::TransactionHeader::new(
self.tx_id,
self.ordinal,
fidl::encoding::DynamicFlags::empty(),
),
body: &mut response,
};
fidl::encoding::with_tls_encode_buf(|bytes, handles| {
fidl::duration_begin!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyCppResponse");
fidl::encoding::Encoder::encode(bytes, handles, &mut msg)?;
fidl::trace_blob!("fidl:blob", "encode", bytes.as_slice());
fidl::duration_end!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
self.control_handle
.inner
.channel()
.write_etc(&*bytes, &mut *handles)
.map_err(fidl::Error::ServerResponseWrite)?;
Ok(())
})
}
}
#[must_use = "FIDL methods require a response to be sent"]
#[derive(Debug)]
pub struct DenyEachBindingOnlyDenyDartResponder {
control_handle: std::mem::ManuallyDrop<DenyEachBindingControlHandle>,
tx_id: u32,
ordinal: u64,
}
/// Set the the channel to be shutdown (see [`DenyEachBindingControlHandle::shutdown`])
/// if the responder is dropped without sending a response, so that the client
/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
impl std::ops::Drop for DenyEachBindingOnlyDenyDartResponder {
fn drop(&mut self) {
self.control_handle.shutdown();
// Safety: drops once, never accessed again
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
}
}
impl fidl::endpoints::Responder for DenyEachBindingOnlyDenyDartResponder {
type ControlHandle = DenyEachBindingControlHandle;
fn control_handle(&self) -> &DenyEachBindingControlHandle {
&self.control_handle
}
fn drop_without_shutdown(mut self) {
// Safety: drops once, never accessed again due to mem::forget
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
// Prevent Drop from running (which would shut down the channel)
std::mem::forget(self);
}
}
impl DenyEachBindingOnlyDenyDartResponder {
/// Sends a response to the FIDL transaction.
///
/// Sets the channel to shutdown if an error occurs.
pub fn send(
self,
mut result: &mut DenyEachBindingOnlyDenyDartResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
if r.is_err() {
self.control_handle.shutdown();
}
self.drop_without_shutdown();
r
}
/// Similar to "send" but does not shutdown the channel if
/// an error occurs.
pub fn send_no_shutdown_on_err(
self,
mut result: &mut DenyEachBindingOnlyDenyDartResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
self.drop_without_shutdown();
r
}
fn send_raw(
&self,
mut _result: &mut DenyEachBindingOnlyDenyDartResult,
) -> Result<(), fidl::Error> {
let mut response = (_result);
let mut msg = fidl::encoding::TransactionMessage {
header: fidl::encoding::TransactionHeader::new(
self.tx_id,
self.ordinal,
fidl::encoding::DynamicFlags::empty(),
),
body: &mut response,
};
fidl::encoding::with_tls_encode_buf(|bytes, handles| {
fidl::duration_begin!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyDartResponse");
fidl::encoding::Encoder::encode(bytes, handles, &mut msg)?;
fidl::trace_blob!("fidl:blob", "encode", bytes.as_slice());
fidl::duration_end!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
self.control_handle
.inner
.channel()
.write_etc(&*bytes, &mut *handles)
.map_err(fidl::Error::ServerResponseWrite)?;
Ok(())
})
}
}
#[must_use = "FIDL methods require a response to be sent"]
#[derive(Debug)]
pub struct DenyEachBindingOnlyDenyGoResponder {
control_handle: std::mem::ManuallyDrop<DenyEachBindingControlHandle>,
tx_id: u32,
ordinal: u64,
}
/// Set the the channel to be shutdown (see [`DenyEachBindingControlHandle::shutdown`])
/// if the responder is dropped without sending a response, so that the client
/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
impl std::ops::Drop for DenyEachBindingOnlyDenyGoResponder {
fn drop(&mut self) {
self.control_handle.shutdown();
// Safety: drops once, never accessed again
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
}
}
impl fidl::endpoints::Responder for DenyEachBindingOnlyDenyGoResponder {
type ControlHandle = DenyEachBindingControlHandle;
fn control_handle(&self) -> &DenyEachBindingControlHandle {
&self.control_handle
}
fn drop_without_shutdown(mut self) {
// Safety: drops once, never accessed again due to mem::forget
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
// Prevent Drop from running (which would shut down the channel)
std::mem::forget(self);
}
}
impl DenyEachBindingOnlyDenyGoResponder {
/// Sends a response to the FIDL transaction.
///
/// Sets the channel to shutdown if an error occurs.
pub fn send(self, mut result: &mut DenyEachBindingOnlyDenyGoResult) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
if r.is_err() {
self.control_handle.shutdown();
}
self.drop_without_shutdown();
r
}
/// Similar to "send" but does not shutdown the channel if
/// an error occurs.
pub fn send_no_shutdown_on_err(
self,
mut result: &mut DenyEachBindingOnlyDenyGoResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
self.drop_without_shutdown();
r
}
fn send_raw(
&self,
mut _result: &mut DenyEachBindingOnlyDenyGoResult,
) -> Result<(), fidl::Error> {
let mut response = (_result);
let mut msg = fidl::encoding::TransactionMessage {
header: fidl::encoding::TransactionHeader::new(
self.tx_id,
self.ordinal,
fidl::encoding::DynamicFlags::empty(),
),
body: &mut response,
};
fidl::encoding::with_tls_encode_buf(|bytes, handles| {
fidl::duration_begin!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyGoResponse");
fidl::encoding::Encoder::encode(bytes, handles, &mut msg)?;
fidl::trace_blob!("fidl:blob", "encode", bytes.as_slice());
fidl::duration_end!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
self.control_handle
.inner
.channel()
.write_etc(&*bytes, &mut *handles)
.map_err(fidl::Error::ServerResponseWrite)?;
Ok(())
})
}
}
#[must_use = "FIDL methods require a response to be sent"]
#[derive(Debug)]
pub struct DenyEachBindingOnlyDenyLibfuzzerResponder {
control_handle: std::mem::ManuallyDrop<DenyEachBindingControlHandle>,
tx_id: u32,
ordinal: u64,
}
/// Set the the channel to be shutdown (see [`DenyEachBindingControlHandle::shutdown`])
/// if the responder is dropped without sending a response, so that the client
/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
impl std::ops::Drop for DenyEachBindingOnlyDenyLibfuzzerResponder {
fn drop(&mut self) {
self.control_handle.shutdown();
// Safety: drops once, never accessed again
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
}
}
impl fidl::endpoints::Responder for DenyEachBindingOnlyDenyLibfuzzerResponder {
type ControlHandle = DenyEachBindingControlHandle;
fn control_handle(&self) -> &DenyEachBindingControlHandle {
&self.control_handle
}
fn drop_without_shutdown(mut self) {
// Safety: drops once, never accessed again due to mem::forget
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
// Prevent Drop from running (which would shut down the channel)
std::mem::forget(self);
}
}
impl DenyEachBindingOnlyDenyLibfuzzerResponder {
/// Sends a response to the FIDL transaction.
///
/// Sets the channel to shutdown if an error occurs.
pub fn send(
self,
mut result: &mut DenyEachBindingOnlyDenyLibfuzzerResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
if r.is_err() {
self.control_handle.shutdown();
}
self.drop_without_shutdown();
r
}
/// Similar to "send" but does not shutdown the channel if
/// an error occurs.
pub fn send_no_shutdown_on_err(
self,
mut result: &mut DenyEachBindingOnlyDenyLibfuzzerResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
self.drop_without_shutdown();
r
}
fn send_raw(
&self,
mut _result: &mut DenyEachBindingOnlyDenyLibfuzzerResult,
) -> Result<(), fidl::Error> {
let mut response = (_result);
let mut msg = fidl::encoding::TransactionMessage {
header: fidl::encoding::TransactionHeader::new(
self.tx_id,
self.ordinal,
fidl::encoding::DynamicFlags::empty(),
),
body: &mut response,
};
fidl::encoding::with_tls_encode_buf(|bytes, handles| {
fidl::duration_begin!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenyLibfuzzerResponse");
fidl::encoding::Encoder::encode(bytes, handles, &mut msg)?;
fidl::trace_blob!("fidl:blob", "encode", bytes.as_slice());
fidl::duration_end!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
self.control_handle
.inner
.channel()
.write_etc(&*bytes, &mut *handles)
.map_err(fidl::Error::ServerResponseWrite)?;
Ok(())
})
}
}
#[must_use = "FIDL methods require a response to be sent"]
#[derive(Debug)]
pub struct DenyEachBindingOnlyDenySyzkallerResponder {
control_handle: std::mem::ManuallyDrop<DenyEachBindingControlHandle>,
tx_id: u32,
ordinal: u64,
}
/// Set the the channel to be shutdown (see [`DenyEachBindingControlHandle::shutdown`])
/// if the responder is dropped without sending a response, so that the client
/// doesn't hang. To prevent this behavior, call `drop_without_shutdown`.
impl std::ops::Drop for DenyEachBindingOnlyDenySyzkallerResponder {
fn drop(&mut self) {
self.control_handle.shutdown();
// Safety: drops once, never accessed again
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
}
}
impl fidl::endpoints::Responder for DenyEachBindingOnlyDenySyzkallerResponder {
type ControlHandle = DenyEachBindingControlHandle;
fn control_handle(&self) -> &DenyEachBindingControlHandle {
&self.control_handle
}
fn drop_without_shutdown(mut self) {
// Safety: drops once, never accessed again due to mem::forget
unsafe { std::mem::ManuallyDrop::drop(&mut self.control_handle) };
// Prevent Drop from running (which would shut down the channel)
std::mem::forget(self);
}
}
impl DenyEachBindingOnlyDenySyzkallerResponder {
/// Sends a response to the FIDL transaction.
///
/// Sets the channel to shutdown if an error occurs.
pub fn send(
self,
mut result: &mut DenyEachBindingOnlyDenySyzkallerResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
if r.is_err() {
self.control_handle.shutdown();
}
self.drop_without_shutdown();
r
}
/// Similar to "send" but does not shutdown the channel if
/// an error occurs.
pub fn send_no_shutdown_on_err(
self,
mut result: &mut DenyEachBindingOnlyDenySyzkallerResult,
) -> Result<(), fidl::Error> {
let r = self.send_raw(result);
self.drop_without_shutdown();
r
}
fn send_raw(
&self,
mut _result: &mut DenyEachBindingOnlyDenySyzkallerResult,
) -> Result<(), fidl::Error> {
let mut response = (_result);
let mut msg = fidl::encoding::TransactionMessage {
header: fidl::encoding::TransactionHeader::new(
self.tx_id,
self.ordinal,
fidl::encoding::DynamicFlags::empty(),
),
body: &mut response,
};
fidl::encoding::with_tls_encode_buf(|bytes, handles| {
fidl::duration_begin!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/DenyEachBindingOnlyDenySyzkallerResponse");
fidl::encoding::Encoder::encode(bytes, handles, &mut msg)?;
fidl::trace_blob!("fidl:blob", "encode", bytes.as_slice());
fidl::duration_end!("fidl", "encode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
self.control_handle
.inner
.channel()
.write_etc(&*bytes, &mut *handles)
.map_err(fidl::Error::ServerResponseWrite)?;
Ok(())
})
}
}
#[derive(Debug, Copy, Clone, Eq, PartialEq, Ord, PartialOrd, Hash)]
pub struct ImportsSameNameContextMarker;
impl fidl::endpoints::ProtocolMarker for ImportsSameNameContextMarker {
type Proxy = ImportsSameNameContextProxy;
type RequestStream = ImportsSameNameContextRequestStream;
const DEBUG_NAME: &'static str = "(anonymous) ImportsSameNameContext";
}
pub trait ImportsSameNameContextProxyInterface: Send + Sync {
fn r#unattributed(&self) -> Result<(), fidl::Error>;
fn r#always_appears_in_importing_library(&self) -> Result<(), fidl::Error>;
}
#[derive(Debug)]
#[cfg(target_os = "fuchsia")]
pub struct ImportsSameNameContextSynchronousProxy {
client: fidl::client::sync::Client,
}
#[cfg(target_os = "fuchsia")]
impl ImportsSameNameContextSynchronousProxy {
pub fn new(channel: fidl::Channel) -> Self {
let protocol_name =
<ImportsSameNameContextMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
Self { client: fidl::client::sync::Client::new(channel, protocol_name) }
}
pub fn into_channel(self) -> fidl::Channel {
self.client.into_channel()
}
/// Waits until an event arrives and returns it. It is safe for other
/// threads to make concurrent requests while waiting for an event.
pub fn wait_for_event(
&self,
deadline: zx::Time,
) -> Result<ImportsSameNameContextEvent, fidl::Error> {
ImportsSameNameContextEvent::decode(self.client.wait_for_event(deadline)?)
}
pub fn r#unattributed(&self) -> Result<(), fidl::Error> {
self.client.send(&mut (), 0x698380acfd29e8f, fidl::encoding::DynamicFlags::empty())
}
pub fn r#always_appears_in_importing_library(&self) -> Result<(), fidl::Error> {
self.client.send(&mut (), 0x2874096c521236f8, fidl::encoding::DynamicFlags::empty())
}
}
#[derive(Debug, Clone)]
pub struct ImportsSameNameContextProxy {
client: fidl::client::Client,
}
impl fidl::endpoints::Proxy for ImportsSameNameContextProxy {
type Protocol = ImportsSameNameContextMarker;
fn from_channel(inner: fidl::AsyncChannel) -> Self {
Self::new(inner)
}
fn into_channel(self) -> Result<::fidl::AsyncChannel, Self> {
self.client.into_channel().map_err(|client| Self { client })
}
fn as_channel(&self) -> &::fidl::AsyncChannel {
self.client.as_channel()
}
}
impl ImportsSameNameContextProxy {
/// Create a new Proxy for ImportsSameNameContext
pub fn new(channel: fidl::AsyncChannel) -> Self {
let protocol_name =
<ImportsSameNameContextMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME;
Self { client: fidl::client::Client::new(channel, protocol_name) }
}
/// Get a Stream of events from the remote end of the ImportsSameNameContext protocol
///
/// # Panics
///
/// Panics if the event stream was already taken.
pub fn take_event_stream(&self) -> ImportsSameNameContextEventStream {
ImportsSameNameContextEventStream { event_receiver: self.client.take_event_receiver() }
}
pub fn r#unattributed(&self) -> Result<(), fidl::Error> {
ImportsSameNameContextProxyInterface::r#unattributed(self)
}
pub fn r#always_appears_in_importing_library(&self) -> Result<(), fidl::Error> {
ImportsSameNameContextProxyInterface::r#always_appears_in_importing_library(self)
}
}
impl ImportsSameNameContextProxyInterface for ImportsSameNameContextProxy {
fn r#unattributed(&self) -> Result<(), fidl::Error> {
self.client.send(&mut (), 0x698380acfd29e8f, fidl::encoding::DynamicFlags::empty())
}
fn r#always_appears_in_importing_library(&self) -> Result<(), fidl::Error> {
self.client.send(&mut (), 0x2874096c521236f8, fidl::encoding::DynamicFlags::empty())
}
}
pub struct ImportsSameNameContextEventStream {
event_receiver: fidl::client::EventReceiver,
}
impl std::marker::Unpin for ImportsSameNameContextEventStream {}
impl futures::stream::FusedStream for ImportsSameNameContextEventStream {
fn is_terminated(&self) -> bool {
self.event_receiver.is_terminated()
}
}
impl futures::Stream for ImportsSameNameContextEventStream {
type Item = Result<ImportsSameNameContextEvent, fidl::Error>;
fn poll_next(
mut self: std::pin::Pin<&mut Self>,
cx: &mut std::task::Context<'_>,
) -> std::task::Poll<Option<Self::Item>> {
let buf = match futures::ready!(futures::stream::StreamExt::poll_next_unpin(
&mut self.event_receiver,
cx
)?) {
Some(buf) => buf,
None => return std::task::Poll::Ready(None),
};
std::task::Poll::Ready(Some(ImportsSameNameContextEvent::decode(buf)))
}
}
#[derive(Debug)]
pub enum ImportsSameNameContextEvent {}
impl ImportsSameNameContextEvent {
fn decode(mut buf: fidl::MessageBufEtc) -> Result<ImportsSameNameContextEvent, fidl::Error> {
let (bytes, _handles) = buf.split_mut();
let (tx_header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
match tx_header.ordinal() {
_ => Err(fidl::Error::UnknownOrdinal {
ordinal: tx_header.ordinal(),
protocol_name:
<ImportsSameNameContextMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
}),
}
}
}
/// A Stream of incoming requests for ImportsSameNameContext
pub struct ImportsSameNameContextRequestStream {
inner: std::sync::Arc<fidl::ServeInner>,
is_terminated: bool,
}
impl std::marker::Unpin for ImportsSameNameContextRequestStream {}
impl futures::stream::FusedStream for ImportsSameNameContextRequestStream {
fn is_terminated(&self) -> bool {
self.is_terminated
}
}
impl fidl::endpoints::RequestStream for ImportsSameNameContextRequestStream {
type Protocol = ImportsSameNameContextMarker;
type ControlHandle = ImportsSameNameContextControlHandle;
fn from_channel(channel: fidl::AsyncChannel) -> Self {
Self { inner: std::sync::Arc::new(fidl::ServeInner::new(channel)), is_terminated: false }
}
fn control_handle(&self) -> Self::ControlHandle {
ImportsSameNameContextControlHandle { inner: self.inner.clone() }
}
fn into_inner(self) -> (::std::sync::Arc<fidl::ServeInner>, bool) {
(self.inner, self.is_terminated)
}
fn from_inner(inner: std::sync::Arc<fidl::ServeInner>, is_terminated: bool) -> Self {
Self { inner, is_terminated }
}
}
impl futures::Stream for ImportsSameNameContextRequestStream {
type Item = Result<ImportsSameNameContextRequest, fidl::Error>;
fn poll_next(
mut self: std::pin::Pin<&mut Self>,
cx: &mut std::task::Context<'_>,
) -> std::task::Poll<Option<Self::Item>> {
let this = &mut *self;
if this.inner.poll_shutdown(cx) {
this.is_terminated = true;
return std::task::Poll::Ready(None);
}
if this.is_terminated {
panic!("polled ImportsSameNameContextRequestStream after completion");
}
fidl::encoding::with_tls_decode_buf(|bytes, handles| {
match this.inner.channel().read_etc(cx, bytes, handles) {
std::task::Poll::Ready(Ok(())) => {}
std::task::Poll::Pending => return std::task::Poll::Pending,
std::task::Poll::Ready(Err(zx_status::Status::PEER_CLOSED)) => {
this.is_terminated = true;
return std::task::Poll::Ready(None);
}
std::task::Poll::Ready(Err(e)) => {
return std::task::Poll::Ready(Some(Err(fidl::Error::ServerRequestRead(e))))
}
}
// A message has been received from the channel
let (header, _body_bytes) = fidl::encoding::decode_transaction_header(bytes)?;
if !header.is_compatible() {
return std::task::Poll::Ready(Some(Err(fidl::Error::IncompatibleMagicNumber(
header.magic_number(),
))));
}
std::task::Poll::Ready(Some(match header.ordinal() {
0x698380acfd29e8f => {
let mut req: () = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/ImportsSameNameContextUnattributedRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = ImportsSameNameContextControlHandle {
inner: this.inner.clone(),
};
Ok(ImportsSameNameContextRequest::Unattributed {control_handle,})
}
0x2874096c521236f8 => {
let mut req: () = fidl::encoding::Decodable::new_empty();
fidl::duration_begin!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "name" => "test.bindingsdenylist/ImportsSameNameContextAlwaysAppearsInImportingLibraryRequest");
fidl::trace_blob!("fidl:blob", "decode", bytes);
fidl::encoding::Decoder::decode_into(&header, _body_bytes, handles, &mut req)?;
fidl::duration_end!("fidl", "decode", "bindings" => _FIDL_TRACE_BINDINGS_RUST, "size" => bytes.len() as u32, "handle_count" => handles.len() as u32);
let control_handle = ImportsSameNameContextControlHandle {
inner: this.inner.clone(),
};
Ok(ImportsSameNameContextRequest::AlwaysAppearsInImportingLibrary {control_handle,})
}
_ => Err(fidl::Error::UnknownOrdinal {
ordinal: header.ordinal(),
protocol_name: <ImportsSameNameContextMarker as fidl::endpoints::ProtocolMarker>::DEBUG_NAME,
}),
}))
})
}
}
#[derive(Debug)]
pub enum ImportsSameNameContextRequest {
Unattributed { control_handle: ImportsSameNameContextControlHandle },
AlwaysAppearsInImportingLibrary { control_handle: ImportsSameNameContextControlHandle },
}
impl ImportsSameNameContextRequest {
#[allow(irrefutable_let_patterns)]
pub fn into_unattributed(self) -> Option<(ImportsSameNameContextControlHandle)> {
if let ImportsSameNameContextRequest::Unattributed { control_handle } = self {
Some((control_handle))
} else {
None
}
}
#[allow(irrefutable_let_patterns)]
pub fn into_always_appears_in_importing_library(
self,
) -> Option<(ImportsSameNameContextControlHandle)> {
if let ImportsSameNameContextRequest::AlwaysAppearsInImportingLibrary { control_handle } =
self
{
Some((control_handle))
} else {
None
}
}
/// Name of the method defined in FIDL
pub fn method_name(&self) -> &'static str {
match *self {
ImportsSameNameContextRequest::Unattributed { .. } => "unattributed",
ImportsSameNameContextRequest::AlwaysAppearsInImportingLibrary { .. } => {
"always_appears_in_importing_library"
}
}
}
}
#[derive(Debug, Clone)]
pub struct ImportsSameNameContextControlHandle {
inner: std::sync::Arc<fidl::ServeInner>,
}
impl fidl::endpoints::ControlHandle for ImportsSameNameContextControlHandle {
fn shutdown(&self) {
self.inner.shutdown()
}
fn shutdown_with_epitaph(&self, status: zx_status::Status) {
self.inner.shutdown_with_epitaph(status)
}
}
impl ImportsSameNameContextControlHandle {}