diff options
| author | mo khan <mo@mokhan.ca> | 2025-07-15 16:37:08 -0600 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2025-07-17 16:30:22 -0600 |
| commit | 45df4d0d9b577fecee798d672695fe24ff57fb1b (patch) | |
| tree | 1b99bf645035b58e0d6db08c7a83521f41f7a75b /vendor/windows-strings/src/pwstr.rs | |
| parent | f94f79608393d4ab127db63cc41668445ef6b243 (diff) | |
feat: migrate from Cedar to SpiceDB authorization system
This is a major architectural change that replaces the Cedar policy-based
authorization system with SpiceDB's relation-based authorization.
Key changes:
- Migrate from Rust to Go implementation
- Replace Cedar policies with SpiceDB schema and relationships
- Switch from envoy `ext_authz` with Cedar to SpiceDB permission checks
- Update build system and dependencies for Go ecosystem
- Maintain Envoy integration for external authorization
This change enables more flexible permission modeling through SpiceDB's
Google Zanzibar inspired relation-based system, supporting complex
hierarchical permissions that were difficult to express in Cedar.
Breaking change: Existing Cedar policies and Rust-based configuration
will no longer work and need to be migrated to SpiceDB schema.
Diffstat (limited to 'vendor/windows-strings/src/pwstr.rs')
| -rw-r--r-- | vendor/windows-strings/src/pwstr.rs | 88 |
1 files changed, 0 insertions, 88 deletions
diff --git a/vendor/windows-strings/src/pwstr.rs b/vendor/windows-strings/src/pwstr.rs deleted file mode 100644 index db4d74ac..00000000 --- a/vendor/windows-strings/src/pwstr.rs +++ /dev/null @@ -1,88 +0,0 @@ -use super::*; - -/// A pointer to a null-terminated string of 16-bit Unicode characters. -#[repr(transparent)] -#[derive(Clone, Copy, PartialEq, Eq, Debug)] -pub struct PWSTR(pub *mut u16); - -impl PWSTR { - /// Construct a new `PWSTR` from a raw pointer. - pub const fn from_raw(ptr: *mut u16) -> Self { - Self(ptr) - } - - /// Construct a null `PWSTR`. - pub const fn null() -> Self { - Self(core::ptr::null_mut()) - } - - /// Returns a raw pointer to the `PWSTR`. - pub const fn as_ptr(&self) -> *mut u16 { - self.0 - } - - /// Checks whether the `PWSTR` is null. - pub fn is_null(&self) -> bool { - self.0.is_null() - } - - /// String length without the trailing 0 - /// - /// # Safety - /// - /// The `PWSTR`'s pointer needs to be valid for reads up until and including the next `\0`. - pub unsafe fn len(&self) -> usize { - unsafe { PCWSTR(self.0).len() } - } - - /// Returns `true` if the string length is zero, and `false` otherwise. - /// - /// # Safety - /// - /// The `PWSTR`'s pointer needs to be valid for reads up until and including the next `\0`. - pub unsafe fn is_empty(&self) -> bool { - unsafe { self.len() == 0 } - } - - /// String data without the trailing 0. - /// - /// # Safety - /// - /// The `PWSTR`'s pointer needs to be valid for reads up until and including the next `\0`. - pub unsafe fn as_wide(&self) -> &[u16] { - unsafe { core::slice::from_raw_parts(self.0, self.len()) } - } - - /// Copy the `PWSTR` into a Rust `String`. - /// - /// # Safety - /// - /// See the safety information for `PWSTR::as_wide`. - pub unsafe fn to_string(&self) -> core::result::Result<String, alloc::string::FromUtf16Error> { - unsafe { String::from_utf16(self.as_wide()) } - } - - /// Copy the `PWSTR` into an `HSTRING`. - /// - /// # Safety - /// - /// See the safety information for `PWSTR::as_wide`. - pub unsafe fn to_hstring(&self) -> HSTRING { - unsafe { HSTRING::from_wide(self.as_wide()) } - } - - /// Allow this string to be displayed. - /// - /// # Safety - /// - /// See the safety information for `PWSTR::as_wide`. - pub unsafe fn display(&self) -> impl core::fmt::Display + '_ { - unsafe { Decode(move || core::char::decode_utf16(self.as_wide().iter().cloned())) } - } -} - -impl Default for PWSTR { - fn default() -> Self { - Self::null() - } -} |
