Various renames in authfs
Some of the names start making less sense now that we're adding
directory support to authfs.
Bug: 203251769
Test: atest AuthFsHostTest
Change-Id: I96bdda4584f587bdd8e9f5ce8d032e1b463264d2
diff --git a/authfs/src/main.rs b/authfs/src/main.rs
index a5fe2c3..432cfab 100644
--- a/authfs/src/main.rs
+++ b/authfs/src/main.rs
@@ -44,7 +44,7 @@
use auth::FakeAuthenticator;
use file::{RemoteDirEditor, RemoteFileEditor, RemoteFileReader, RemoteMerkleTreeReader};
use fsverity::{VerifiedFileEditor, VerifiedFileReader};
-use fusefs::{FileConfig, Inode};
+use fusefs::{AuthFsEntry, Inode};
#[derive(StructOpt)]
struct Args {
@@ -115,15 +115,15 @@
})
}
-fn new_config_remote_verified_file(
+fn new_remote_verified_file_entry(
service: file::VirtFdService,
remote_fd: i32,
file_size: u64,
-) -> Result<FileConfig> {
+) -> Result<AuthFsEntry> {
let signature = service.readFsveritySignature(remote_fd).context("Failed to read signature")?;
let authenticator = FakeAuthenticator::always_succeed();
- Ok(FileConfig::VerifiedReadonly {
+ Ok(AuthFsEntry::VerifiedReadonly {
reader: VerifiedFileReader::new(
&authenticator,
RemoteFileReader::new(service.clone(), remote_fd),
@@ -135,40 +135,40 @@
})
}
-fn new_config_remote_unverified_file(
+fn new_remote_unverified_file_entry(
service: file::VirtFdService,
remote_fd: i32,
file_size: u64,
-) -> Result<FileConfig> {
+) -> Result<AuthFsEntry> {
let reader = RemoteFileReader::new(service, remote_fd);
- Ok(FileConfig::UnverifiedReadonly { reader, file_size })
+ Ok(AuthFsEntry::UnverifiedReadonly { reader, file_size })
}
-fn new_config_remote_new_verified_file(
+fn new_remote_new_verified_file_entry(
service: file::VirtFdService,
remote_fd: i32,
-) -> Result<FileConfig> {
+) -> Result<AuthFsEntry> {
let remote_file = RemoteFileEditor::new(service, remote_fd);
- Ok(FileConfig::VerifiedNew { editor: VerifiedFileEditor::new(remote_file) })
+ Ok(AuthFsEntry::VerifiedNew { editor: VerifiedFileEditor::new(remote_file) })
}
-fn new_config_remote_new_verified_dir(
+fn new_remote_new_verified_dir_entry(
service: file::VirtFdService,
remote_fd: i32,
-) -> Result<FileConfig> {
+) -> Result<AuthFsEntry> {
let dir = RemoteDirEditor::new(service, remote_fd);
- Ok(FileConfig::VerifiedNewDirectory { dir })
+ Ok(AuthFsEntry::VerifiedNewDirectory { dir })
}
-fn prepare_file_pool(args: &Args) -> Result<BTreeMap<Inode, FileConfig>> {
- let mut file_pool = BTreeMap::new();
+fn prepare_root_dir_entries(args: &Args) -> Result<BTreeMap<Inode, AuthFsEntry>> {
+ let mut root_entries = BTreeMap::new();
let service = file::get_rpc_binder_service(args.cid)?;
for config in &args.remote_ro_file {
- file_pool.insert(
+ root_entries.insert(
config.remote_fd.try_into()?,
- new_config_remote_verified_file(
+ new_remote_verified_file_entry(
service.clone(),
config.remote_fd,
service.getFileSize(config.remote_fd)?.try_into()?,
@@ -178,9 +178,9 @@
for remote_fd in &args.remote_ro_file_unverified {
let remote_fd = *remote_fd;
- file_pool.insert(
+ root_entries.insert(
remote_fd.try_into()?,
- new_config_remote_unverified_file(
+ new_remote_unverified_file_entry(
service.clone(),
remote_fd,
service.getFileSize(remote_fd)?.try_into()?,
@@ -190,21 +190,21 @@
for remote_fd in &args.remote_new_rw_file {
let remote_fd = *remote_fd;
- file_pool.insert(
+ root_entries.insert(
remote_fd.try_into()?,
- new_config_remote_new_verified_file(service.clone(), remote_fd)?,
+ new_remote_new_verified_file_entry(service.clone(), remote_fd)?,
);
}
for remote_fd in &args.remote_new_rw_dir {
let remote_fd = *remote_fd;
- file_pool.insert(
+ root_entries.insert(
remote_fd.try_into()?,
- new_config_remote_new_verified_dir(service.clone(), remote_fd)?,
+ new_remote_new_verified_dir_entry(service.clone(), remote_fd)?,
);
}
- Ok(file_pool)
+ Ok(root_entries)
}
fn try_main() -> Result<()> {
@@ -215,8 +215,8 @@
android_logger::Config::default().with_tag("authfs").with_min_level(log_level),
);
- let file_pool = prepare_file_pool(&args)?;
- fusefs::loop_forever(file_pool, &args.mount_point, &args.extra_options)?;
+ let root_entries = prepare_root_dir_entries(&args)?;
+ fusefs::loop_forever(root_entries, &args.mount_point, &args.extra_options)?;
bail!("Unexpected exit after the handler loop")
}