pub struct VirtualRoot<Marker = ()> { /* private fields */ }
Expand description
SUMMARY:
Provide a user‑facing virtual root that produces VirtualPath
values clamped to a boundary.
Implementations§
Source§impl<Marker> VirtualRoot<Marker>
impl<Marker> VirtualRoot<Marker>
Sourcepub fn try_new<P: AsRef<Path>>(root_path: P) -> Result<Self>
pub fn try_new<P: AsRef<Path>>(root_path: P) -> Result<Self>
SUMMARY:
Create a VirtualRoot
from an existing directory.
PARAMETERS:
root_path
(AsRef<Path>
): Existing directory to anchor the virtual root.
RETURNS:
Result<VirtualRoot<Marker>>
: New virtual root with clamped operations.
ERRORS:
StrictPathError::InvalidRestriction
: Root invalid or cannot be canonicalized.
EXAMPLE:
Uses AsRef<Path>
for maximum ergonomics, including direct TempDir
support for clean shadowing patterns:
use strict_path::VirtualRoot;
let tmp_dir = tempfile::tempdir()?;
let tmp_dir = VirtualRoot::<()>::try_new(tmp_dir)?; // Clean variable shadowing
Sourcepub fn try_new_temp() -> Result<Self>
pub fn try_new_temp() -> Result<Self>
SUMMARY:
Create a VirtualRoot
backed by a unique temporary directory with RAII cleanup.
§Example
use strict_path::VirtualRoot;
let uploads_root = VirtualRoot::<()>::try_new_temp()?;
let tenant_file = uploads_root.virtual_join("tenant/document.pdf")?;
let display = tenant_file.virtualpath_display().to_string();
assert!(display.starts_with("/"));
Sourcepub fn try_new_temp_with_prefix(prefix: &str) -> Result<Self>
pub fn try_new_temp_with_prefix(prefix: &str) -> Result<Self>
SUMMARY:
Create a VirtualRoot
in a temporary directory with a custom prefix and RAII cleanup.
§Example
use strict_path::VirtualRoot;
let session_root = VirtualRoot::<()>::try_new_temp_with_prefix("session")?;
let export_path = session_root.virtual_join("exports/report.txt")?;
let display = export_path.virtualpath_display().to_string();
assert!(display.starts_with("/exports"));
Sourcepub fn metadata(&self) -> Result<Metadata>
pub fn metadata(&self) -> Result<Metadata>
SUMMARY: Return filesystem metadata for the underlying root directory.
Sourcepub fn into_virtualpath(self) -> Result<VirtualPath<Marker>>
pub fn into_virtualpath(self) -> Result<VirtualPath<Marker>>
SUMMARY:
Consume this virtual root and return the rooted VirtualPath
(“/”).
PARAMETERS:
- none
RETURNS:
Result<VirtualPath<Marker>>
: Virtual root path clamped to this boundary.
ERRORS:
StrictPathError::PathResolutionError
: Canonicalization fails (root removed or inaccessible).StrictPathError::PathEscapesBoundary
: Root moved outside the boundary between checks.
EXAMPLE:
let vroot: VirtualRoot = VirtualRoot::try_new(&root)?;
let root_virtual: VirtualPath = vroot.into_virtualpath()?;
assert_eq!(root_virtual.virtualpath_display().to_string(), "/");
Sourcepub fn change_marker<NewMarker>(self) -> VirtualRoot<NewMarker>
pub fn change_marker<NewMarker>(self) -> VirtualRoot<NewMarker>
SUMMARY: Consume this virtual root and substitute a new marker type.
DETAILS:
Mirrors crate::PathBoundary::change_marker
, crate::StrictPath::change_marker
, and
crate::VirtualPath::change_marker
. Use this when encoding proven authorization
into the type system (e.g., after validating a user’s permissions). The
consumption makes marker changes explicit during code review.
PARAMETERS:
NewMarker
(type parameter): Marker to associate with the virtual root.
RETURNS:
VirtualRoot<NewMarker>
: Same underlying root, rebranded withNewMarker
.
EXAMPLE:
struct UserFiles;
struct ReadOnly;
struct ReadWrite;
let read_root: VirtualRoot<(UserFiles, ReadOnly)> = VirtualRoot::try_new(&root_dir)?;
// After authorization check...
let write_root: VirtualRoot<(UserFiles, ReadWrite)> = read_root.change_marker();
Sourcepub fn virtual_symlink(&self, link_path: &VirtualPath<Marker>) -> Result<()>
pub fn virtual_symlink(&self, link_path: &VirtualPath<Marker>) -> Result<()>
SUMMARY:
Create a symbolic link at link_path
pointing to this root’s underlying directory.
Sourcepub fn virtual_hard_link(&self, link_path: &VirtualPath<Marker>) -> Result<()>
pub fn virtual_hard_link(&self, link_path: &VirtualPath<Marker>) -> Result<()>
SUMMARY:
Create a hard link at link_path
pointing to this root’s underlying directory.
Sourcepub fn read_dir(&self) -> Result<ReadDir>
pub fn read_dir(&self) -> Result<ReadDir>
SUMMARY: Read directory entries at the virtual root (discovery). Re‑join names through virtual/strict APIs before I/O.
Sourcepub fn remove_dir(&self) -> Result<()>
pub fn remove_dir(&self) -> Result<()>
SUMMARY: Remove the underlying root directory (non‑recursive); fails if not empty.
Sourcepub fn remove_dir_all(&self) -> Result<()>
pub fn remove_dir_all(&self) -> Result<()>
SUMMARY: Recursively remove the underlying root directory and all its contents.
Sourcepub fn try_new_create<P: AsRef<Path>>(root_path: P) -> Result<Self>
pub fn try_new_create<P: AsRef<Path>>(root_path: P) -> Result<Self>
SUMMARY:
Ensure the directory exists (create if missing), then return a VirtualRoot
.
EXAMPLE:
Uses AsRef<Path>
for maximum ergonomics, including direct TempDir
support for clean shadowing patterns:
use strict_path::VirtualRoot;
let tmp_dir = tempfile::tempdir()?;
let tmp_dir = VirtualRoot::<()>::try_new_create(tmp_dir)?; // Clean variable shadowing
Sourcepub fn virtual_join<P: AsRef<Path>>(
&self,
candidate_path: P,
) -> Result<VirtualPath<Marker>>
pub fn virtual_join<P: AsRef<Path>>( &self, candidate_path: P, ) -> Result<VirtualPath<Marker>>
SUMMARY:
Join a candidate path to this virtual root, producing a clamped VirtualPath
.
DETAILS:
This is the security gateway for virtual paths. Absolute paths (starting with "/"
) are
automatically clamped to the virtual root, ensuring paths cannot escape the sandbox.
For example, "/etc/config"
becomes vroot/etc/config
, and traversal attempts like
"../../../../etc/passwd"
are clamped to vroot/etc/passwd
. This clamping behavior is
what makes the virtual_
dimension safe for user-facing operations.
PARAMETERS:
candidate_path
(AsRef<Path>
): Virtual path to resolve and clamp. Absolute paths are interpreted relative to the virtual root, not the system root.
RETURNS:
Result<VirtualPath<Marker>>
: Clamped, validated path within the virtual root.
ERRORS:
StrictPathError::PathResolutionError
,StrictPathError::PathEscapesBoundary
.
EXAMPLE:
let vroot: VirtualRoot = VirtualRoot::try_new_create(td.path())?;
// Absolute paths are clamped to virtual root, not system root
let path1 = vroot.virtual_join("/etc/config")?;
assert_eq!(path1.virtualpath_display().to_string(), "/etc/config");
// Traversal attempts are also clamped
let path2 = vroot.virtual_join("../../../etc/passwd")?;
assert_eq!(path2.virtualpath_display().to_string(), "/etc/passwd");
// Both paths are safely within the virtual root on the actual filesystem
Sourcepub fn interop_path(&self) -> &OsStr
pub fn interop_path(&self) -> &OsStr
SUMMARY:
Return the virtual root path as &OsStr
for unavoidable third-party AsRef<Path>
interop.
Sourcepub fn as_unvirtual(&self) -> &PathBoundary<Marker>
pub fn as_unvirtual(&self) -> &PathBoundary<Marker>
SUMMARY:
Borrow the underlying PathBoundary
.
Sourcepub fn unvirtual(self) -> PathBoundary<Marker>
pub fn unvirtual(self) -> PathBoundary<Marker>
SUMMARY:
Consume this VirtualRoot
and return the underlying PathBoundary
(symmetry with virtualize
).
Sourcepub fn try_new_os_config(app_name: &str) -> Result<Self>
pub fn try_new_os_config(app_name: &str) -> Result<Self>
Creates a virtual root in the OS standard config directory.
Cross-Platform Behavior:
- Linux:
~/.config/{app_name}
(XDG Base Directory Specification) - Windows:
%APPDATA%\{app_name}
(Known Folder API - Roaming AppData) - macOS:
~/Library/Application Support/{app_name}
(Apple Standard Directories)
Sourcepub fn try_new_os_data(app_name: &str) -> Result<Self>
pub fn try_new_os_data(app_name: &str) -> Result<Self>
Creates a virtual root in the OS standard data directory.
Sourcepub fn try_new_os_cache(app_name: &str) -> Result<Self>
pub fn try_new_os_cache(app_name: &str) -> Result<Self>
Creates a virtual root in the OS standard cache directory.
Sourcepub fn try_new_os_config_local(app_name: &str) -> Result<Self>
pub fn try_new_os_config_local(app_name: &str) -> Result<Self>
Creates a virtual root in the OS local config directory.
Sourcepub fn try_new_os_data_local(app_name: &str) -> Result<Self>
pub fn try_new_os_data_local(app_name: &str) -> Result<Self>
Creates a virtual root in the OS local data directory.
Sourcepub fn try_new_os_home() -> Result<Self>
pub fn try_new_os_home() -> Result<Self>
Creates a virtual root in the user’s home directory.
Sourcepub fn try_new_os_desktop() -> Result<Self>
pub fn try_new_os_desktop() -> Result<Self>
Creates a virtual root in the user’s desktop directory.
Sourcepub fn try_new_os_documents() -> Result<Self>
pub fn try_new_os_documents() -> Result<Self>
Creates a virtual root in the user’s documents directory.
Sourcepub fn try_new_os_downloads() -> Result<Self>
pub fn try_new_os_downloads() -> Result<Self>
Creates a virtual root in the user’s downloads directory.
Sourcepub fn try_new_os_pictures() -> Result<Self>
pub fn try_new_os_pictures() -> Result<Self>
Creates a virtual root in the user’s pictures directory.
Sourcepub fn try_new_os_audio() -> Result<Self>
pub fn try_new_os_audio() -> Result<Self>
Creates a virtual root in the user’s music/audio directory.
Sourcepub fn try_new_os_videos() -> Result<Self>
pub fn try_new_os_videos() -> Result<Self>
Creates a virtual root in the user’s videos directory.
Sourcepub fn try_new_os_executables() -> Result<Self>
pub fn try_new_os_executables() -> Result<Self>
Creates a virtual root in the OS executable directory (Linux only).
Sourcepub fn try_new_os_runtime() -> Result<Self>
pub fn try_new_os_runtime() -> Result<Self>
Creates a virtual root in the OS runtime directory (Linux only).
Sourcepub fn try_new_os_state(app_name: &str) -> Result<Self>
pub fn try_new_os_state(app_name: &str) -> Result<Self>
Creates a virtual root in the OS state directory (Linux only).
Sourcepub fn try_new_app_path<P: AsRef<Path>>(
subdir: P,
env_override: Option<&str>,
) -> Result<Self>
pub fn try_new_app_path<P: AsRef<Path>>( subdir: P, env_override: Option<&str>, ) -> Result<Self>
SUMMARY:
Create a virtual root using the app-path
strategy (portable app‑relative directory),
optionally honoring an environment variable override.
PARAMETERS:
subdir
(AsRef<Path>
): Subdirectory path relative to the executable location (or to the directory specified by the environment override). Accepts any path‑like value viaAsRef<Path>
.env_override
(Option<&str>): Optional environment variable name to check first; when set and the variable is present, its value is used as the root base instead of the executable directory.
RETURNS:
Result<VirtualRoot<Marker>>
: Virtual root whose underlyingPathBoundary
is created if missing and proven safe; all subsequentvirtual_join
operations are clamped to this root.
ERRORS:
StrictPathError::InvalidRestriction
: Ifapp-path
resolution fails or the directory cannot be created/validated.
EXAMPLE:
use strict_path::VirtualRoot;
// Create ./data relative to the executable (portable layout)
let vroot = VirtualRoot::<()>::try_new_app_path("data", None)?;
let vp = vroot.virtual_join("docs/report.txt")?;
assert_eq!(vp.virtualpath_display().to_string(), "/docs/report.txt");
// With environment override: respects MYAPP_DATA_DIR when set
let _vroot = VirtualRoot::<()>::try_new_app_path("data", Some("MYAPP_DATA_DIR"))?;
Sourcepub fn try_new_app_path_with_env<P: AsRef<Path>>(
subdir: P,
env_override: &str,
) -> Result<Self>
pub fn try_new_app_path_with_env<P: AsRef<Path>>( subdir: P, env_override: &str, ) -> Result<Self>
SUMMARY:
Create a virtual root via app-path
, always consulting a specific environment variable
before falling back to the executable‑relative directory.
PARAMETERS:
subdir
(AsRef<Path>
): Subdirectory path used withapp-path
resolution.env_override
(&str): Environment variable name to check first for the root base.
RETURNS:
Result<VirtualRoot<Marker>>
: New virtual root anchored usingapp-path
semantics.
ERRORS:
StrictPathError::InvalidRestriction
: If resolution fails or the directory can’t be created/validated.
EXAMPLE:
use strict_path::VirtualRoot;
let _vroot = VirtualRoot::<()>::try_new_app_path_with_env("cache", "MYAPP_CACHE_DIR")?;
Trait Implementations§
Source§impl<Marker> AsRef<Path> for VirtualRoot<Marker>
impl<Marker> AsRef<Path> for VirtualRoot<Marker>
Source§impl<Marker: Clone> Clone for VirtualRoot<Marker>
impl<Marker: Clone> Clone for VirtualRoot<Marker>
Source§fn clone(&self) -> VirtualRoot<Marker>
fn clone(&self) -> VirtualRoot<Marker>
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl<Marker> Debug for VirtualRoot<Marker>
impl<Marker> Debug for VirtualRoot<Marker>
Source§impl<Marker> Display for VirtualRoot<Marker>
impl<Marker> Display for VirtualRoot<Marker>
Source§impl<Marker: Default> FromStr for VirtualRoot<Marker>
impl<Marker: Default> FromStr for VirtualRoot<Marker>
Source§fn from_str(path: &str) -> Result<Self, Self::Err>
fn from_str(path: &str) -> Result<Self, Self::Err>
Parse a VirtualRoot from a string path for universal ergonomics.
Creates the directory if it doesn’t exist, enabling seamless integration with any string-parsing context (clap, config files, environment variables, etc.):
let temp_dir = tempfile::tempdir()?;
let virtual_path = temp_dir.path().join("virtual_dir");
let vroot: VirtualRoot<()> = virtual_path.to_string_lossy().parse()?;
assert!(virtual_path.exists());
Source§type Err = StrictPathError
type Err = StrictPathError
Source§impl<Marker> Hash for VirtualRoot<Marker>
impl<Marker> Hash for VirtualRoot<Marker>
Source§impl<Marker> Ord for VirtualRoot<Marker>
impl<Marker> Ord for VirtualRoot<Marker>
Source§impl<Marker> PartialEq<&Path> for VirtualRoot<Marker>
impl<Marker> PartialEq<&Path> for VirtualRoot<Marker>
Source§impl<Marker> PartialEq<Path> for VirtualRoot<Marker>
impl<Marker> PartialEq<Path> for VirtualRoot<Marker>
Source§impl<M1, M2> PartialEq<PathBoundary<M2>> for VirtualRoot<M1>
impl<M1, M2> PartialEq<PathBoundary<M2>> for VirtualRoot<M1>
Source§impl<Marker> PartialEq<PathBuf> for VirtualRoot<Marker>
impl<Marker> PartialEq<PathBuf> for VirtualRoot<Marker>
Source§impl<M1, M2> PartialEq<VirtualRoot<M2>> for PathBoundary<M1>
Available on crate feature virtual-path
only.
impl<M1, M2> PartialEq<VirtualRoot<M2>> for PathBoundary<M1>
virtual-path
only.