use std::ptr;
glib::wrapper! {
+ /// Kernel arguments.
#[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
pub struct KernelArgs(Boxed<ffi::OstreeKernelArgs>);
}
impl KernelArgs {
+ /// Add a kernel argument.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn append(&mut self, arg: &str) {
unsafe {
}
}
+ /// Add multiple kernel arguments.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn append_argv(&mut self, argv: &[&str]) {
unsafe {
}
}
+ /// Appends each argument that does not have one of `prefixes`.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn append_argv_filtered(&mut self, argv: &[&str], prefixes: &[&str]) {
unsafe {
}
}
+ /// Append the entire contents of the currently booted kernel commandline.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn append_proc_cmdline<P: IsA<gio::Cancellable>>(
&mut self,
}
}
+ /// Remove a kernel argument.
pub fn delete(&mut self, arg: &str) -> Result<(), glib::Error> {
unsafe {
let mut error = ptr::null_mut();
}
}
+ /// Remove a kernel argument.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn delete_key_entry(&mut self, key: &str) -> Result<(), glib::Error> {
unsafe {
}
}
+ /// Given `foo`, return the last the value of a `foo=bar` key as `bar`.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn get_last_value(&self, key: &str) -> Option<GString> {
unsafe {
}
}
+ /// Replace any existing `foo=bar` with `foo=other` e.g.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn new_replace(&mut self, arg: &str) -> Result<(), glib::Error> {
unsafe {
}
}
+ /// Append from a whitespace-separated string.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn parse_append(&mut self, options: &str) {
unsafe {
}
}
+ /// Replace a kernel argument.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn replace(&mut self, arg: &str) {
unsafe {
}
}
+ /// Replace multiple kernel arguments.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn replace_argv(&mut self, argv: &[&str]) {
unsafe {
}
}
+ /// A duplicate of `replace`.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn replace_take(&mut self, arg: &str) {
unsafe {
}
}
+ /// Convert the kernel arguments to a string.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
fn to_gstring(&self) -> GString {
unsafe {
}
}
+ /// Convert the kernel arguments to a string array.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn to_strv(&self) -> Vec<GString> {
unsafe {
// Not needed
//pub fn cleanup(loc: /*Unimplemented*/Option<Fundamental: Pointer>)
+ /// Parse the given string as kernel arguments.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn from_string(options: &str) -> KernelArgs {
unsafe {
}
}
+ /// Create new empty kernel arguments.
#[cfg(any(feature = "v2019_3", feature = "dox"))]
pub fn new() -> KernelArgs {
unsafe { from_glib_full(ffi::ostree_kernel_args_new()) }
#[cfg(any(feature = "v2018_2", feature = "dox"))]
pub use self::repo_checkout_filter::RepoCheckoutFilter;
+/// Options for checking out an OSTree commit.
pub struct RepoCheckoutAtOptions {
+ /// Checkout mode.
pub mode: RepoCheckoutMode,
+ /// Overwrite mode.
pub overwrite_mode: RepoCheckoutOverwriteMode,
+ /// Deprecated, do not use.
pub enable_uncompressed_cache: bool,
+ /// Perform `fsync()` on checked out files and directories.
pub enable_fsync: bool,
+ /// Handle OCI/Docker style whiteout files.
pub process_whiteouts: bool,
+ /// Require hardlinking.
pub no_copy_fallback: bool,
+ /// Never hardlink; reflink if possible, otherwise full physical copy.
#[cfg(any(feature = "v2017_6", feature = "dox"))]
pub force_copy: bool,
+ /// Suppress mode bits outside of 0775 for directories.
#[cfg(any(feature = "v2017_7", feature = "dox"))]
pub bareuseronly_dirs: bool,
+ /// Copy zero-sized files rather than hardlinking.
#[cfg(any(feature = "v2018_9", feature = "dox"))]
pub force_copy_zerosized: bool,
+ /// Only check out this subpath.
pub subpath: Option<PathBuf>,
+ /// A cache from device, inode pairs to checksums.
pub devino_to_csum_cache: Option<RepoDevInoCache>,
/// A callback function to decide which files and directories will be checked out from the
/// repo. See the documentation on [RepoCheckoutFilter](struct.RepoCheckoutFilter.html) for more
/// callback to catch and silence any panics that occur.
#[cfg(any(feature = "v2018_2", feature = "dox"))]
pub filter: Option<RepoCheckoutFilter>,
+ /// SELinux policy.
#[cfg(any(feature = "v2017_6", feature = "dox"))]
pub sepolicy: Option<SePolicy>,
+ /// When computing security contexts, prefix the path with this value.
pub sepolicy_prefix: Option<String>,
}