nv-redfish 0.6.3

Rust implementation of Redfish API for BMC management
Documentation
// SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
// SPDX-License-Identifier: Apache-2.0
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//! Secure boot.

use crate::schema::secure_boot::SecureBoot as SecureBootSchema;
use crate::Error;
use crate::NvBmc;
use nv_redfish_core::Bmc;
use nv_redfish_core::NavProperty;
use std::convert::identity;
use std::marker::PhantomData;
use std::sync::Arc;

#[doc(inline)]
pub use crate::schema::secure_boot::SecureBootCurrentBootType;

/// Secure boot.
///
/// Provides functions to access Secure Boot functions.
pub struct SecureBoot<B: Bmc> {
    data: Arc<SecureBootSchema>,
    _marker: PhantomData<B>,
}

impl<B: Bmc> SecureBoot<B> {
    /// Create a new secure boot handle.
    pub(crate) async fn new(
        bmc: &NvBmc<B>,
        nav: &NavProperty<SecureBootSchema>,
    ) -> Result<Self, Error<B>> {
        nav.get(bmc.as_ref())
            .await
            .map_err(crate::Error::Bmc)
            .map(|data| Self {
                data,
                _marker: PhantomData,
            })
    }

    /// Get the raw schema data for the Secure boot.
    #[must_use]
    pub fn raw(&self) -> Arc<SecureBootSchema> {
        self.data.clone()
    }

    /// Get an indication of whether UEFI Secure Boot is enabled.
    #[must_use]
    pub fn secure_boot_enable(&self) -> Option<bool> {
        self.data.secure_boot_enable.and_then(identity)
    }

    /// The UEFI Secure Boot state during the current boot cycle.
    #[must_use]
    pub fn secure_boot_current_boot(&self) -> Option<SecureBootCurrentBootType> {
        self.data.secure_boot_current_boot.and_then(identity)
    }
}