Skip to main content

tokio/fs/
open_options.rs

1use crate::fs::{asyncify, File};
2
3use std::io;
4use std::path::Path;
5
6cfg_io_uring! {
7    mod uring_open_options;
8    pub(crate) use uring_open_options::UringOpenOptions;
9    use crate::runtime::driver::op::Op;
10}
11
12#[cfg(test)]
13mod mock_open_options;
14#[cfg(test)]
15use mock_open_options::MockOpenOptions as StdOpenOptions;
16#[cfg(not(test))]
17use std::fs::OpenOptions as StdOpenOptions;
18
19#[cfg(unix)]
20use std::os::unix::fs::OpenOptionsExt;
21#[cfg(windows)]
22use std::os::windows::fs::OpenOptionsExt;
23
24/// Options and flags which can be used to configure how a file is opened.
25///
26/// This builder exposes the ability to configure how a [`File`] is opened and
27/// what operations are permitted on the open file. The [`File::open`] and
28/// [`File::create`] methods are aliases for commonly used options using this
29/// builder.
30///
31/// Generally speaking, when using `OpenOptions`, you'll first call [`new`],
32/// then chain calls to methods to set each option, then call [`open`], passing
33/// the path of the file you're trying to open. This will give you a
34/// [`io::Result`] with a [`File`] inside that you can further operate
35/// on.
36///
37/// This is a specialized version of [`std::fs::OpenOptions`] for usage from
38/// the Tokio runtime.
39///
40/// `From<std::fs::OpenOptions>` is implemented for more advanced configuration
41/// than the methods provided here.
42///
43/// [`new`]: OpenOptions::new
44/// [`open`]: OpenOptions::open
45/// [`File`]: File
46/// [`File::open`]: File::open
47/// [`File::create`]: File::create
48///
49/// # Examples
50///
51/// Opening a file to read:
52///
53/// ```no_run
54/// use tokio::fs::OpenOptions;
55/// use std::io;
56///
57/// #[tokio::main]
58/// async fn main() -> io::Result<()> {
59///     let file = OpenOptions::new()
60///         .read(true)
61///         .open("foo.txt")
62///         .await?;
63///
64///     Ok(())
65/// }
66/// ```
67///
68/// Opening a file for both reading and writing, as well as creating it if it
69/// doesn't exist:
70///
71/// ```no_run
72/// use tokio::fs::OpenOptions;
73/// use std::io;
74///
75/// #[tokio::main]
76/// async fn main() -> io::Result<()> {
77///     let file = OpenOptions::new()
78///         .read(true)
79///         .write(true)
80///         .create(true)
81///         .open("foo.txt")
82///         .await?;
83///
84///     Ok(())
85/// }
86/// ```
87#[derive(Clone, Debug)]
88pub struct OpenOptions {
89    inner: Kind,
90}
91
92#[derive(Debug, Clone)]
93enum Kind {
94    Std(StdOpenOptions),
95    #[cfg(all(
96        tokio_unstable,
97        feature = "io-uring",
98        feature = "rt",
99        feature = "fs",
100        target_os = "linux"
101    ))]
102    Uring(UringOpenOptions),
103}
104
105impl OpenOptions {
106    /// Creates a blank new set of options ready for configuration.
107    ///
108    /// All options are initially set to `false`.
109    ///
110    /// This is an async version of [`std::fs::OpenOptions::new`][std]
111    ///
112    /// [std]: std::fs::OpenOptions::new
113    ///
114    /// # Examples
115    ///
116    /// ```no_run
117    /// use tokio::fs::OpenOptions;
118    ///
119    /// let mut options = OpenOptions::new();
120    /// let future = options.read(true).open("foo.txt");
121    /// ```
122    pub fn new() -> OpenOptions {
123        #[cfg(all(
124            tokio_unstable,
125            feature = "io-uring",
126            feature = "rt",
127            feature = "fs",
128            target_os = "linux"
129        ))]
130        let inner = Kind::Uring(UringOpenOptions::new());
131        #[cfg(not(all(
132            tokio_unstable,
133            feature = "io-uring",
134            feature = "rt",
135            feature = "fs",
136            target_os = "linux"
137        )))]
138        let inner = Kind::Std(StdOpenOptions::new());
139
140        OpenOptions { inner }
141    }
142
143    /// Sets the option for read access.
144    ///
145    /// This option, when true, will indicate that the file should be
146    /// `read`-able if opened.
147    ///
148    /// This is an async version of [`std::fs::OpenOptions::read`][std]
149    ///
150    /// [std]: std::fs::OpenOptions::read
151    ///
152    /// # Examples
153    ///
154    /// ```no_run
155    /// use tokio::fs::OpenOptions;
156    /// use std::io;
157    ///
158    /// #[tokio::main]
159    /// async fn main() -> io::Result<()> {
160    ///     let file = OpenOptions::new()
161    ///         .read(true)
162    ///         .open("foo.txt")
163    ///         .await?;
164    ///
165    ///     Ok(())
166    /// }
167    /// ```
168    pub fn read(&mut self, read: bool) -> &mut OpenOptions {
169        match &mut self.inner {
170            Kind::Std(opts) => {
171                opts.read(read);
172            }
173            #[cfg(all(
174                tokio_unstable,
175                feature = "io-uring",
176                feature = "rt",
177                feature = "fs",
178                target_os = "linux"
179            ))]
180            Kind::Uring(opts) => {
181                opts.read(read);
182            }
183        }
184        self
185    }
186
187    /// Sets the option for write access.
188    ///
189    /// This option, when true, will indicate that the file should be
190    /// `write`-able if opened.
191    ///
192    /// This is an async version of [`std::fs::OpenOptions::write`][std]
193    ///
194    /// [std]: std::fs::OpenOptions::write
195    ///
196    /// # Examples
197    ///
198    /// ```no_run
199    /// use tokio::fs::OpenOptions;
200    /// use std::io;
201    ///
202    /// #[tokio::main]
203    /// async fn main() -> io::Result<()> {
204    ///     let file = OpenOptions::new()
205    ///         .write(true)
206    ///         .open("foo.txt")
207    ///         .await?;
208    ///
209    ///     Ok(())
210    /// }
211    /// ```
212    pub fn write(&mut self, write: bool) -> &mut OpenOptions {
213        match &mut self.inner {
214            Kind::Std(opts) => {
215                opts.write(write);
216            }
217            #[cfg(all(
218                tokio_unstable,
219                feature = "io-uring",
220                feature = "rt",
221                feature = "fs",
222                target_os = "linux"
223            ))]
224            Kind::Uring(opts) => {
225                opts.write(write);
226            }
227        }
228        self
229    }
230
231    /// Sets the option for the append mode.
232    ///
233    /// This option, when true, means that writes will append to a file instead
234    /// of overwriting previous contents.  Note that setting
235    /// `.write(true).append(true)` has the same effect as setting only
236    /// `.append(true)`.
237    ///
238    /// For most filesystems, the operating system guarantees that all writes are
239    /// atomic: no writes get mangled because another process writes at the same
240    /// time.
241    ///
242    /// One maybe obvious note when using append-mode: make sure that all data
243    /// that belongs together is written to the file in one operation. This
244    /// can be done by concatenating strings before passing them to [`write()`],
245    /// or using a buffered writer (with a buffer of adequate size),
246    /// and calling [`flush()`] when the message is complete.
247    ///
248    /// If a file is opened with both read and append access, beware that after
249    /// opening, and after every write, the position for reading may be set at the
250    /// end of the file. So, before writing, save the current position (using
251    /// [`seek`]`(`[`SeekFrom`]`::`[`Current`]`(0))`), and restore it before the next read.
252    ///
253    /// This is an async version of [`std::fs::OpenOptions::append`][std]
254    ///
255    /// [std]: std::fs::OpenOptions::append
256    ///
257    /// ## Note
258    ///
259    /// This function doesn't create the file if it doesn't exist. Use the [`create`]
260    /// method to do so.
261    ///
262    /// [`write()`]: crate::io::AsyncWriteExt::write
263    /// [`flush()`]: crate::io::AsyncWriteExt::flush
264    /// [`seek`]: crate::io::AsyncSeekExt::seek
265    /// [`SeekFrom`]: std::io::SeekFrom
266    /// [`Current`]: std::io::SeekFrom::Current
267    /// [`create`]: OpenOptions::create
268    ///
269    /// # Examples
270    ///
271    /// ```no_run
272    /// use tokio::fs::OpenOptions;
273    /// use std::io;
274    ///
275    /// #[tokio::main]
276    /// async fn main() -> io::Result<()> {
277    ///     let file = OpenOptions::new()
278    ///         .append(true)
279    ///         .open("foo.txt")
280    ///         .await?;
281    ///
282    ///     Ok(())
283    /// }
284    /// ```
285    pub fn append(&mut self, append: bool) -> &mut OpenOptions {
286        match &mut self.inner {
287            Kind::Std(opts) => {
288                opts.append(append);
289            }
290            #[cfg(all(
291                tokio_unstable,
292                feature = "io-uring",
293                feature = "rt",
294                feature = "fs",
295                target_os = "linux"
296            ))]
297            Kind::Uring(opts) => {
298                opts.append(append);
299            }
300        }
301        self
302    }
303
304    /// Sets the option for truncating a previous file.
305    ///
306    /// If a file is successfully opened with this option set it will truncate
307    /// the file to 0 length if it already exists.
308    ///
309    /// The file must be opened with write access for truncate to work.
310    ///
311    /// This is an async version of [`std::fs::OpenOptions::truncate`][std]
312    ///
313    /// [std]: std::fs::OpenOptions::truncate
314    ///
315    /// # Examples
316    ///
317    /// ```no_run
318    /// use tokio::fs::OpenOptions;
319    /// use std::io;
320    ///
321    /// #[tokio::main]
322    /// async fn main() -> io::Result<()> {
323    ///     let file = OpenOptions::new()
324    ///         .write(true)
325    ///         .truncate(true)
326    ///         .open("foo.txt")
327    ///         .await?;
328    ///
329    ///     Ok(())
330    /// }
331    /// ```
332    pub fn truncate(&mut self, truncate: bool) -> &mut OpenOptions {
333        match &mut self.inner {
334            Kind::Std(opts) => {
335                opts.truncate(truncate);
336            }
337            #[cfg(all(
338                tokio_unstable,
339                feature = "io-uring",
340                feature = "rt",
341                feature = "fs",
342                target_os = "linux"
343            ))]
344            Kind::Uring(opts) => {
345                opts.truncate(truncate);
346            }
347        }
348        self
349    }
350
351    /// Sets the option for creating a new file.
352    ///
353    /// This option indicates whether a new file will be created if the file
354    /// does not yet already exist.
355    ///
356    /// In order for the file to be created, [`write`] or [`append`] access must
357    /// be used.
358    ///
359    /// This is an async version of [`std::fs::OpenOptions::create`][std]
360    ///
361    /// [std]: std::fs::OpenOptions::create
362    /// [`write`]: OpenOptions::write
363    /// [`append`]: OpenOptions::append
364    ///
365    /// # Examples
366    ///
367    /// ```no_run
368    /// use tokio::fs::OpenOptions;
369    /// use std::io;
370    ///
371    /// #[tokio::main]
372    /// async fn main() -> io::Result<()> {
373    ///     let file = OpenOptions::new()
374    ///         .write(true)
375    ///         .create(true)
376    ///         .open("foo.txt")
377    ///         .await?;
378    ///
379    ///     Ok(())
380    /// }
381    /// ```
382    pub fn create(&mut self, create: bool) -> &mut OpenOptions {
383        match &mut self.inner {
384            Kind::Std(opts) => {
385                opts.create(create);
386            }
387            #[cfg(all(
388                tokio_unstable,
389                feature = "io-uring",
390                feature = "rt",
391                feature = "fs",
392                target_os = "linux"
393            ))]
394            Kind::Uring(opts) => {
395                opts.create(create);
396            }
397        }
398        self
399    }
400
401    /// Sets the option to always create a new file.
402    ///
403    /// This option indicates whether a new file will be created.  No file is
404    /// allowed to exist at the target location, also no (dangling) symlink.
405    ///
406    /// This option is useful because it is atomic. Otherwise between checking
407    /// whether a file exists and creating a new one, the file may have been
408    /// created by another process (a TOCTOU race condition / attack).
409    ///
410    /// If `.create_new(true)` is set, [`.create()`] and [`.truncate()`] are
411    /// ignored.
412    ///
413    /// The file must be opened with write or append access in order to create a
414    /// new file.
415    ///
416    /// This is an async version of [`std::fs::OpenOptions::create_new`][std]
417    ///
418    /// [std]: std::fs::OpenOptions::create_new
419    /// [`.create()`]: OpenOptions::create
420    /// [`.truncate()`]: OpenOptions::truncate
421    ///
422    /// # Examples
423    ///
424    /// ```no_run
425    /// use tokio::fs::OpenOptions;
426    /// use std::io;
427    ///
428    /// #[tokio::main]
429    /// async fn main() -> io::Result<()> {
430    ///     let file = OpenOptions::new()
431    ///         .write(true)
432    ///         .create_new(true)
433    ///         .open("foo.txt")
434    ///         .await?;
435    ///
436    ///     Ok(())
437    /// }
438    /// ```
439    pub fn create_new(&mut self, create_new: bool) -> &mut OpenOptions {
440        match &mut self.inner {
441            Kind::Std(opts) => {
442                opts.create_new(create_new);
443            }
444            #[cfg(all(
445                tokio_unstable,
446                feature = "io-uring",
447                feature = "rt",
448                feature = "fs",
449                target_os = "linux"
450            ))]
451            Kind::Uring(opts) => {
452                opts.create_new(create_new);
453            }
454        }
455        self
456    }
457
458    /// Opens a file at `path` with the options specified by `self`.
459    ///
460    /// This is an async version of [`std::fs::OpenOptions::open`][std]
461    ///
462    /// [std]: std::fs::OpenOptions::open
463    ///
464    /// # Errors
465    ///
466    /// This function will return an error under a number of different
467    /// circumstances. Some of these error conditions are listed here, together
468    /// with their [`ErrorKind`]. The mapping to [`ErrorKind`]s is not part of
469    /// the compatibility contract of the function, especially the `Other` kind
470    /// might change to more specific kinds in the future.
471    ///
472    /// * [`NotFound`]: The specified file does not exist and neither `create`
473    ///   or `create_new` is set.
474    /// * [`NotFound`]: One of the directory components of the file path does
475    ///   not exist.
476    /// * [`PermissionDenied`]: The user lacks permission to get the specified
477    ///   access rights for the file.
478    /// * [`PermissionDenied`]: The user lacks permission to open one of the
479    ///   directory components of the specified path.
480    /// * [`AlreadyExists`]: `create_new` was specified and the file already
481    ///   exists.
482    /// * [`InvalidInput`]: Invalid combinations of open options (truncate
483    ///   without write access, no access mode set, etc.).
484    /// * [`Other`]: One of the directory components of the specified file path
485    ///   was not, in fact, a directory.
486    /// * [`Other`]: Filesystem-level errors: full disk, write permission
487    ///   requested on a read-only file system, exceeded disk quota, too many
488    ///   open files, too long filename, too many symbolic links in the
489    ///   specified path (Unix-like systems only), etc.
490    ///
491    /// # io_uring support
492    ///
493    /// On Linux, you can also use `io_uring` for executing system calls.
494    /// To enable `io_uring`, you need to specify the `--cfg tokio_unstable`
495    /// flag at compile time, enable the `io-uring` cargo feature, and set the
496    /// `Builder::enable_io_uring` runtime option.
497    ///
498    /// Support for `io_uring` is currently experimental, so its behavior may
499    /// change or it may be removed in future versions.
500    ///
501    /// # Examples
502    ///
503    /// ```no_run
504    /// use tokio::fs::OpenOptions;
505    /// use std::io;
506    ///
507    /// #[tokio::main]
508    /// async fn main() -> io::Result<()> {
509    ///     let file = OpenOptions::new().open("foo.txt").await?;
510    ///     Ok(())
511    /// }
512    /// ```
513    ///
514    /// [`ErrorKind`]: std::io::ErrorKind
515    /// [`AlreadyExists`]: std::io::ErrorKind::AlreadyExists
516    /// [`InvalidInput`]: std::io::ErrorKind::InvalidInput
517    /// [`NotFound`]: std::io::ErrorKind::NotFound
518    /// [`Other`]: std::io::ErrorKind::Other
519    /// [`PermissionDenied`]: std::io::ErrorKind::PermissionDenied
520    pub async fn open(&self, path: impl AsRef<Path>) -> io::Result<File> {
521        match &self.inner {
522            Kind::Std(opts) => Self::std_open(opts, path).await,
523            #[cfg(all(
524                tokio_unstable,
525                feature = "io-uring",
526                feature = "rt",
527                feature = "fs",
528                target_os = "linux"
529            ))]
530            Kind::Uring(opts) => {
531                let handle = crate::runtime::Handle::current();
532                let driver_handle = handle.inner.driver().io();
533
534                if driver_handle
535                    .check_and_init(io_uring::opcode::OpenAt::CODE)
536                    .await?
537                {
538                    Op::open(path.as_ref(), opts)?.await
539                } else {
540                    let opts = opts.clone().into();
541                    Self::std_open(&opts, path).await
542                }
543            }
544        }
545    }
546
547    async fn std_open(opts: &StdOpenOptions, path: impl AsRef<Path>) -> io::Result<File> {
548        let path = path.as_ref().to_owned();
549        let opts = opts.clone();
550
551        let std = asyncify(move || opts.open(path)).await?;
552        Ok(File::from_std(std))
553    }
554
555    #[cfg(windows)]
556    pub(super) fn as_inner_mut(&mut self) -> &mut StdOpenOptions {
557        match &mut self.inner {
558            Kind::Std(ref mut opts) => opts,
559        }
560    }
561}
562
563feature! {
564    #![unix]
565
566    impl OpenOptions {
567        /// Sets the mode bits that a new file will be created with.
568        ///
569        /// If a new file is created as part of an `OpenOptions::open` call then this
570        /// specified `mode` will be used as the permission bits for the new file.
571        /// If no `mode` is set, the default of `0o666` will be used.
572        /// The operating system masks out bits with the system's `umask`, to produce
573        /// the final permissions.
574        ///
575        /// # Examples
576        ///
577        /// ```no_run
578        /// use tokio::fs::OpenOptions;
579        /// use std::io;
580        ///
581        /// #[tokio::main]
582        /// async fn main() -> io::Result<()> {
583        ///     let mut options = OpenOptions::new();
584        ///     options.mode(0o644); // Give read/write for owner and read for others.
585        ///     let file = options.open("foo.txt").await?;
586        ///
587        ///     Ok(())
588        /// }
589        /// ```
590        pub fn mode(&mut self, mode: u32) -> &mut OpenOptions {
591            match &mut self.inner {
592                Kind::Std(opts) => {
593                    opts.mode(mode);
594                }
595                #[cfg(all(
596                    tokio_unstable,
597                    feature = "io-uring",
598                    feature = "rt",
599                    feature = "fs",
600                    target_os = "linux"
601                ))]
602                Kind::Uring(opts) => {
603                    opts.mode(mode);
604                }
605            }
606            self
607        }
608
609        /// Passes custom flags to the `flags` argument of `open`.
610        ///
611        /// The bits that define the access mode are masked out with `O_ACCMODE`, to
612        /// ensure they do not interfere with the access mode set by Rusts options.
613        ///
614        /// Custom flags can only set flags, not remove flags set by Rusts options.
615        /// This options overwrites any previously set custom flags.
616        ///
617        /// # Examples
618        ///
619        /// ```no_run
620        /// use tokio::fs::OpenOptions;
621        /// use std::io;
622        ///
623        /// #[tokio::main]
624        /// async fn main() -> io::Result<()> {
625        ///     let mut options = OpenOptions::new();
626        ///     options.write(true);
627        ///     if cfg!(unix) {
628        ///         options.custom_flags(libc::O_NOFOLLOW);
629        ///     }
630        ///     let file = options.open("foo.txt").await?;
631        ///
632        ///     Ok(())
633        /// }
634        /// ```
635        pub fn custom_flags(&mut self, flags: i32) -> &mut OpenOptions {
636            match &mut self.inner {
637                Kind::Std(opts) => {
638                    opts.custom_flags(flags);
639                }
640                #[cfg(all(
641                    tokio_unstable,
642                    feature = "io-uring",
643                    feature = "rt",
644                    feature = "fs",
645                    target_os = "linux"
646                ))]
647                Kind::Uring(opts) => {
648                    opts.custom_flags(flags);
649                }
650            }
651            self
652        }
653    }
654}
655
656cfg_windows! {
657    impl OpenOptions {
658        /// Overrides the `dwDesiredAccess` argument to the call to [`CreateFile`]
659        /// with the specified value.
660        ///
661        /// This will override the `read`, `write`, and `append` flags on the
662        /// `OpenOptions` structure. This method provides fine-grained control over
663        /// the permissions to read, write and append data, attributes (like hidden
664        /// and system), and extended attributes.
665        ///
666        /// # Examples
667        ///
668        /// ```no_run
669        /// use tokio::fs::OpenOptions;
670        ///
671        /// # #[tokio::main]
672        /// # async fn main() -> std::io::Result<()> {
673        /// // Open without read and write permission, for example if you only need
674        /// // to call `stat` on the file
675        /// let file = OpenOptions::new().access_mode(0).open("foo.txt").await?;
676        /// # Ok(())
677        /// # }
678        /// ```
679        ///
680        /// [`CreateFile`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea
681        pub fn access_mode(&mut self, access: u32) -> &mut OpenOptions {
682            self.as_inner_mut().access_mode(access);
683            self
684        }
685
686        /// Overrides the `dwShareMode` argument to the call to [`CreateFile`] with
687        /// the specified value.
688        ///
689        /// By default `share_mode` is set to
690        /// `FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE`. This allows
691        /// other processes to read, write, and delete/rename the same file
692        /// while it is open. Removing any of the flags will prevent other
693        /// processes from performing the corresponding operation until the file
694        /// handle is closed.
695        ///
696        /// # Examples
697        ///
698        /// ```no_run
699        /// use tokio::fs::OpenOptions;
700        ///
701        /// # #[tokio::main]
702        /// # async fn main() -> std::io::Result<()> {
703        /// // Do not allow others to read or modify this file while we have it open
704        /// // for writing.
705        /// let file = OpenOptions::new()
706        ///     .write(true)
707        ///     .share_mode(0)
708        ///     .open("foo.txt").await?;
709        /// # Ok(())
710        /// # }
711        /// ```
712        ///
713        /// [`CreateFile`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea
714        pub fn share_mode(&mut self, share: u32) -> &mut OpenOptions {
715            self.as_inner_mut().share_mode(share);
716            self
717        }
718
719        /// Sets extra flags for the `dwFileFlags` argument to the call to
720        /// [`CreateFile2`] to the specified value (or combines it with
721        /// `attributes` and `security_qos_flags` to set the `dwFlagsAndAttributes`
722        /// for [`CreateFile`]).
723        ///
724        /// Custom flags can only set flags, not remove flags set by Rust's options.
725        /// This option overwrites any previously set custom flags.
726        ///
727        /// # Examples
728        ///
729        /// ```no_run
730        /// use windows_sys::Win32::Storage::FileSystem::FILE_FLAG_DELETE_ON_CLOSE;
731        /// use tokio::fs::OpenOptions;
732        ///
733        /// # #[tokio::main]
734        /// # async fn main() -> std::io::Result<()> {
735        /// let file = OpenOptions::new()
736        ///     .create(true)
737        ///     .write(true)
738        ///     .custom_flags(FILE_FLAG_DELETE_ON_CLOSE)
739        ///     .open("foo.txt").await?;
740        /// # Ok(())
741        /// # }
742        /// ```
743        ///
744        /// [`CreateFile`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea
745        /// [`CreateFile2`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfile2
746        pub fn custom_flags(&mut self, flags: u32) -> &mut OpenOptions {
747            self.as_inner_mut().custom_flags(flags);
748            self
749        }
750
751        /// Sets the `dwFileAttributes` argument to the call to [`CreateFile2`] to
752        /// the specified value (or combines it with `custom_flags` and
753        /// `security_qos_flags` to set the `dwFlagsAndAttributes` for
754        /// [`CreateFile`]).
755        ///
756        /// If a _new_ file is created because it does not yet exist and
757        /// `.create(true)` or `.create_new(true)` are specified, the new file is
758        /// given the attributes declared with `.attributes()`.
759        ///
760        /// If an _existing_ file is opened with `.create(true).truncate(true)`, its
761        /// existing attributes are preserved and combined with the ones declared
762        /// with `.attributes()`.
763        ///
764        /// In all other cases the attributes get ignored.
765        ///
766        /// # Examples
767        ///
768        /// ```no_run
769        /// use windows_sys::Win32::Storage::FileSystem::FILE_ATTRIBUTE_HIDDEN;
770        /// use tokio::fs::OpenOptions;
771        ///
772        /// # #[tokio::main]
773        /// # async fn main() -> std::io::Result<()> {
774        /// let file = OpenOptions::new()
775        ///     .write(true)
776        ///     .create(true)
777        ///     .attributes(FILE_ATTRIBUTE_HIDDEN)
778        ///     .open("foo.txt").await?;
779        /// # Ok(())
780        /// # }
781        /// ```
782        ///
783        /// [`CreateFile`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea
784        /// [`CreateFile2`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfile2
785        pub fn attributes(&mut self, attributes: u32) -> &mut OpenOptions {
786            self.as_inner_mut().attributes(attributes);
787            self
788        }
789
790        /// Sets the `dwSecurityQosFlags` argument to the call to [`CreateFile2`] to
791        /// the specified value (or combines it with `custom_flags` and `attributes`
792        /// to set the `dwFlagsAndAttributes` for [`CreateFile`]).
793        ///
794        /// By default `security_qos_flags` is not set. It should be specified when
795        /// opening a named pipe, to control to which degree a server process can
796        /// act on behalf of a client process (security impersonation level).
797        ///
798        /// When `security_qos_flags` is not set, a malicious program can gain the
799        /// elevated privileges of a privileged Rust process when it allows opening
800        /// user-specified paths, by tricking it into opening a named pipe. So
801        /// arguably `security_qos_flags` should also be set when opening arbitrary
802        /// paths. However the bits can then conflict with other flags, specifically
803        /// `FILE_FLAG_OPEN_NO_RECALL`.
804        ///
805        /// For information about possible values, see [Impersonation Levels] on the
806        /// Windows Dev Center site. The `SECURITY_SQOS_PRESENT` flag is set
807        /// automatically when using this method.
808        ///
809        /// # Examples
810        ///
811        /// ```no_run
812        /// use windows_sys::Win32::Storage::FileSystem::SECURITY_IDENTIFICATION;
813        /// use tokio::fs::OpenOptions;
814        ///
815        /// # #[tokio::main]
816        /// # async fn main() -> std::io::Result<()> {
817        /// let file = OpenOptions::new()
818        ///     .write(true)
819        ///     .create(true)
820        ///
821        ///     // Sets the flag value to `SecurityIdentification`.
822        ///     .security_qos_flags(SECURITY_IDENTIFICATION)
823        ///
824        ///     .open(r"\\.\pipe\MyPipe").await?;
825        /// # Ok(())
826        /// # }
827        /// ```
828        ///
829        /// [`CreateFile`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea
830        /// [`CreateFile2`]: https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfile2
831        /// [Impersonation Levels]:
832        ///     https://docs.microsoft.com/en-us/windows/win32/api/winnt/ne-winnt-security_impersonation_level
833        pub fn security_qos_flags(&mut self, flags: u32) -> &mut OpenOptions {
834            self.as_inner_mut().security_qos_flags(flags);
835            self
836        }
837    }
838}
839
840impl From<StdOpenOptions> for OpenOptions {
841    fn from(options: StdOpenOptions) -> OpenOptions {
842        OpenOptions {
843            inner: Kind::Std(options),
844            // TODO: Add support for converting `StdOpenOptions` to `UringOpenOptions`
845            // if user enables `io-uring` cargo feature. It is blocked by:
846            // * https://github.com/rust-lang/rust/issues/74943
847            // * https://github.com/rust-lang/rust/issues/76801
848        }
849    }
850}
851
852impl Default for OpenOptions {
853    fn default() -> Self {
854        Self::new()
855    }
856}