aws_sdk_kms/protocol_serde/
shape_re_encrypt.rs1#[allow(clippy::unnecessary_wraps)]
3pub fn de_re_encrypt_http_error(
4 _response_status: u16,
5 _response_headers: &::aws_smithy_runtime_api::http::Headers,
6 _response_body: &[u8],
7) -> std::result::Result<crate::operation::re_encrypt::ReEncryptOutput, crate::operation::re_encrypt::ReEncryptError> {
8 #[allow(unused_mut)]
9 let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
10 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
11 generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
12 let generic = generic_builder.build();
13 let error_code = match generic.code() {
14 Some(code) => code,
15 None => return Err(crate::operation::re_encrypt::ReEncryptError::unhandled(generic)),
16 };
17
18 let _error_message = generic.message().map(|msg| msg.to_owned());
19 Err(match error_code {
20 "DependencyTimeoutException" => crate::operation::re_encrypt::ReEncryptError::DependencyTimeoutException({
21 #[allow(unused_mut)]
22 let mut tmp = {
23 #[allow(unused_mut)]
24 let mut output = crate::types::error::builders::DependencyTimeoutExceptionBuilder::default();
25 output = crate::protocol_serde::shape_dependency_timeout_exception::de_dependency_timeout_exception_json_err(_response_body, output)
26 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
27 let output = output.meta(generic);
28 output.build()
29 };
30 if tmp.message.is_none() {
31 tmp.message = _error_message;
32 }
33 tmp
34 }),
35 "DisabledException" => crate::operation::re_encrypt::ReEncryptError::DisabledException({
36 #[allow(unused_mut)]
37 let mut tmp = {
38 #[allow(unused_mut)]
39 let mut output = crate::types::error::builders::DisabledExceptionBuilder::default();
40 output = crate::protocol_serde::shape_disabled_exception::de_disabled_exception_json_err(_response_body, output)
41 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
42 let output = output.meta(generic);
43 output.build()
44 };
45 if tmp.message.is_none() {
46 tmp.message = _error_message;
47 }
48 tmp
49 }),
50 "DryRunOperationException" => crate::operation::re_encrypt::ReEncryptError::DryRunOperationException({
51 #[allow(unused_mut)]
52 let mut tmp = {
53 #[allow(unused_mut)]
54 let mut output = crate::types::error::builders::DryRunOperationExceptionBuilder::default();
55 output = crate::protocol_serde::shape_dry_run_operation_exception::de_dry_run_operation_exception_json_err(_response_body, output)
56 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
57 let output = output.meta(generic);
58 output.build()
59 };
60 if tmp.message.is_none() {
61 tmp.message = _error_message;
62 }
63 tmp
64 }),
65 "IncorrectKeyException" => crate::operation::re_encrypt::ReEncryptError::IncorrectKeyException({
66 #[allow(unused_mut)]
67 let mut tmp = {
68 #[allow(unused_mut)]
69 let mut output = crate::types::error::builders::IncorrectKeyExceptionBuilder::default();
70 output = crate::protocol_serde::shape_incorrect_key_exception::de_incorrect_key_exception_json_err(_response_body, output)
71 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
72 let output = output.meta(generic);
73 output.build()
74 };
75 if tmp.message.is_none() {
76 tmp.message = _error_message;
77 }
78 tmp
79 }),
80 "InvalidCiphertextException" => crate::operation::re_encrypt::ReEncryptError::InvalidCiphertextException({
81 #[allow(unused_mut)]
82 let mut tmp = {
83 #[allow(unused_mut)]
84 let mut output = crate::types::error::builders::InvalidCiphertextExceptionBuilder::default();
85 output = crate::protocol_serde::shape_invalid_ciphertext_exception::de_invalid_ciphertext_exception_json_err(_response_body, output)
86 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
87 let output = output.meta(generic);
88 output.build()
89 };
90 if tmp.message.is_none() {
91 tmp.message = _error_message;
92 }
93 tmp
94 }),
95 "InvalidGrantTokenException" => crate::operation::re_encrypt::ReEncryptError::InvalidGrantTokenException({
96 #[allow(unused_mut)]
97 let mut tmp = {
98 #[allow(unused_mut)]
99 let mut output = crate::types::error::builders::InvalidGrantTokenExceptionBuilder::default();
100 output =
101 crate::protocol_serde::shape_invalid_grant_token_exception::de_invalid_grant_token_exception_json_err(_response_body, output)
102 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
103 let output = output.meta(generic);
104 output.build()
105 };
106 if tmp.message.is_none() {
107 tmp.message = _error_message;
108 }
109 tmp
110 }),
111 "InvalidKeyUsageException" => crate::operation::re_encrypt::ReEncryptError::InvalidKeyUsageException({
112 #[allow(unused_mut)]
113 let mut tmp = {
114 #[allow(unused_mut)]
115 let mut output = crate::types::error::builders::InvalidKeyUsageExceptionBuilder::default();
116 output = crate::protocol_serde::shape_invalid_key_usage_exception::de_invalid_key_usage_exception_json_err(_response_body, output)
117 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
118 let output = output.meta(generic);
119 output.build()
120 };
121 if tmp.message.is_none() {
122 tmp.message = _error_message;
123 }
124 tmp
125 }),
126 "KeyUnavailableException" => crate::operation::re_encrypt::ReEncryptError::KeyUnavailableException({
127 #[allow(unused_mut)]
128 let mut tmp = {
129 #[allow(unused_mut)]
130 let mut output = crate::types::error::builders::KeyUnavailableExceptionBuilder::default();
131 output = crate::protocol_serde::shape_key_unavailable_exception::de_key_unavailable_exception_json_err(_response_body, output)
132 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
133 let output = output.meta(generic);
134 output.build()
135 };
136 if tmp.message.is_none() {
137 tmp.message = _error_message;
138 }
139 tmp
140 }),
141 "KMSInternalException" => crate::operation::re_encrypt::ReEncryptError::KmsInternalException({
142 #[allow(unused_mut)]
143 let mut tmp = {
144 #[allow(unused_mut)]
145 let mut output = crate::types::error::builders::KmsInternalExceptionBuilder::default();
146 output = crate::protocol_serde::shape_kms_internal_exception::de_kms_internal_exception_json_err(_response_body, output)
147 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
148 let output = output.meta(generic);
149 output.build()
150 };
151 if tmp.message.is_none() {
152 tmp.message = _error_message;
153 }
154 tmp
155 }),
156 "KMSInvalidStateException" => crate::operation::re_encrypt::ReEncryptError::KmsInvalidStateException({
157 #[allow(unused_mut)]
158 let mut tmp = {
159 #[allow(unused_mut)]
160 let mut output = crate::types::error::builders::KmsInvalidStateExceptionBuilder::default();
161 output = crate::protocol_serde::shape_kms_invalid_state_exception::de_kms_invalid_state_exception_json_err(_response_body, output)
162 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
163 let output = output.meta(generic);
164 output.build()
165 };
166 if tmp.message.is_none() {
167 tmp.message = _error_message;
168 }
169 tmp
170 }),
171 "NotFoundException" => crate::operation::re_encrypt::ReEncryptError::NotFoundException({
172 #[allow(unused_mut)]
173 let mut tmp = {
174 #[allow(unused_mut)]
175 let mut output = crate::types::error::builders::NotFoundExceptionBuilder::default();
176 output = crate::protocol_serde::shape_not_found_exception::de_not_found_exception_json_err(_response_body, output)
177 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
178 let output = output.meta(generic);
179 output.build()
180 };
181 if tmp.message.is_none() {
182 tmp.message = _error_message;
183 }
184 tmp
185 }),
186 _ => crate::operation::re_encrypt::ReEncryptError::generic(generic),
187 })
188}
189
190#[allow(clippy::unnecessary_wraps)]
191pub fn de_re_encrypt_http_response(
192 _response_status: u16,
193 _response_headers: &::aws_smithy_runtime_api::http::Headers,
194 _response_body: &[u8],
195) -> std::result::Result<crate::operation::re_encrypt::ReEncryptOutput, crate::operation::re_encrypt::ReEncryptError> {
196 Ok({
197 #[allow(unused_mut)]
198 let mut output = crate::operation::re_encrypt::builders::ReEncryptOutputBuilder::default();
199 output = crate::protocol_serde::shape_re_encrypt::de_re_encrypt(_response_body, output)
200 .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
201 output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
202 output.build()
203 })
204}
205
206pub fn ser_re_encrypt_input(
207 input: &crate::operation::re_encrypt::ReEncryptInput,
208) -> ::std::result::Result<::aws_smithy_types::body::SdkBody, ::aws_smithy_types::error::operation::SerializationError> {
209 let mut out = String::new();
210 let mut object = ::aws_smithy_json::serialize::JsonObjectWriter::new(&mut out);
211 crate::protocol_serde::shape_re_encrypt_input::ser_re_encrypt_input_input(&mut object, input)?;
212 object.finish();
213 Ok(::aws_smithy_types::body::SdkBody::from(out))
214}
215
216pub(crate) fn de_re_encrypt(
217 value: &[u8],
218 mut builder: crate::operation::re_encrypt::builders::ReEncryptOutputBuilder,
219) -> ::std::result::Result<crate::operation::re_encrypt::builders::ReEncryptOutputBuilder, ::aws_smithy_json::deserialize::error::DeserializeError> {
220 let mut tokens_owned = ::aws_smithy_json::deserialize::json_token_iter(crate::protocol_serde::or_empty_doc(value)).peekable();
221 let tokens = &mut tokens_owned;
222 ::aws_smithy_json::deserialize::token::expect_start_object(tokens.next())?;
223 loop {
224 match tokens.next().transpose()? {
225 Some(::aws_smithy_json::deserialize::Token::EndObject { .. }) => break,
226 Some(::aws_smithy_json::deserialize::Token::ObjectKey { key, .. }) => match key.to_unescaped()?.as_ref() {
227 "CiphertextBlob" => {
228 builder = builder.set_ciphertext_blob(::aws_smithy_json::deserialize::token::expect_blob_or_null(tokens.next())?);
229 }
230 "SourceKeyId" => {
231 builder = builder.set_source_key_id(
232 ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
233 .map(|s| s.to_unescaped().map(|u| u.into_owned()))
234 .transpose()?,
235 );
236 }
237 "KeyId" => {
238 builder = builder.set_key_id(
239 ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
240 .map(|s| s.to_unescaped().map(|u| u.into_owned()))
241 .transpose()?,
242 );
243 }
244 "SourceEncryptionAlgorithm" => {
245 builder = builder.set_source_encryption_algorithm(
246 ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
247 .map(|s| s.to_unescaped().map(|u| crate::types::EncryptionAlgorithmSpec::from(u.as_ref())))
248 .transpose()?,
249 );
250 }
251 "DestinationEncryptionAlgorithm" => {
252 builder = builder.set_destination_encryption_algorithm(
253 ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
254 .map(|s| s.to_unescaped().map(|u| crate::types::EncryptionAlgorithmSpec::from(u.as_ref())))
255 .transpose()?,
256 );
257 }
258 "SourceKeyMaterialId" => {
259 builder = builder.set_source_key_material_id(
260 ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
261 .map(|s| s.to_unescaped().map(|u| u.into_owned()))
262 .transpose()?,
263 );
264 }
265 "DestinationKeyMaterialId" => {
266 builder = builder.set_destination_key_material_id(
267 ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
268 .map(|s| s.to_unescaped().map(|u| u.into_owned()))
269 .transpose()?,
270 );
271 }
272 _ => ::aws_smithy_json::deserialize::token::skip_value(tokens)?,
273 },
274 other => {
275 return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(format!(
276 "expected object key or end object, found: {other:?}"
277 )))
278 }
279 }
280 }
281 if tokens.next().is_some() {
282 return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(
283 "found more JSON tokens after completing parsing",
284 ));
285 }
286 Ok(builder)
287}