endpoint-sec 0.5.1

High-level Rust wrappers around the Endpoint Security Framework
Documentation
//! [`EventXpMalwareRemediated`]

use std::ffi::OsStr;

use endpoint_sec_sys::es_event_xp_malware_remediated_t;

use crate::AuditToken;

/// XProtect remediated malware.
#[doc(alias = "es_event_xp_malware_remediated_t")]
pub struct EventXpMalwareRemediated<'a> {
    /// Raw event
    pub(crate) raw: &'a es_event_xp_malware_remediated_t,
}

impl<'a> EventXpMalwareRemediated<'a> {
    /// Version of the signatures used for detection. Currently corresponds to XProtect version.
    #[inline(always)]
    pub fn signature_version(&self) -> &'a OsStr {
        // Safety: 'a tied to self, object obtained through ES
        unsafe { self.raw.signature_version.as_os_str() }
    }

    /// String identifying the malware that was remediated.
    #[inline(always)]
    pub fn malware_identifier(&self) -> &'a OsStr {
        // Safety: 'a tied to self, object obtained through ES
        unsafe { self.raw.malware_identifier.as_os_str() }
    }

    /// String identifying the incident, intended for linking multiple malware remediated and
    /// remediated events.
    #[inline(always)]
    pub fn incident_identifier(&self) -> &'a OsStr {
        // Safety: 'a tied to self, object obtained through ES
        unsafe { self.raw.incident_identifier.as_os_str() }
    }

    /// String indicating the type of action that was taken, e.g. "path_delete".
    #[inline(always)]
    pub fn action_type(&self) -> &'a OsStr {
        // Safety: 'a tied to self, object obtained through ES
        unsafe { self.raw.action_type.as_os_str() }
    }

    /// True only if remediation was successful.
    #[inline(always)]
    pub fn success(&self) -> bool {
        self.raw.success
    }

    /// String describing specific reasons for failure or success.
    #[inline(always)]
    pub fn result_description(&self) -> &'a OsStr {
        // Safety: 'a tied to self, object obtained through ES
        unsafe { self.raw.result_description.as_os_str() }
    }

    /// Optional. Path that was subject to remediation, if any. This path is not necessarily
    /// a malicious binary, it can also be a legitimate file containing a malicious portion.
    /// Specifically, the file at this path may still exist after successful remediation.
    #[inline(always)]
    pub fn remediated_path(&self) -> &'a OsStr {
        // Safety: 'a tied to self, object obtained through ES
        unsafe { self.raw.remediated_path.as_os_str() }
    }

    /// Audit token of process that was subject to remediation, if any.
    #[inline(always)]
    pub fn remediated_process_audit_token(&self) -> Option<AuditToken> {
        // Safety: 'a tied to self, object obtained through ES
        let at = unsafe { self.raw.remediated_process_audit_token()? };
        Some(AuditToken::new(*at))
    }
}

// Safety: safe to send across threads: does not contain any interior mutability nor depend on current thread state
unsafe impl Send for EventXpMalwareRemediated<'_> {}
// Safety: safe to share across threads: does not contain any interior mutability nor depend on current thread state
unsafe impl Sync for EventXpMalwareRemediated<'_> {}

impl_debug_eq_hash_with_functions!(
    EventXpMalwareRemediated<'a>;
    signature_version, malware_identifier, incident_identifier, action_type,
    success, result_description, remediated_path, remediated_process_audit_token,
);