#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
#[non_exhaustive]
pub struct CreateSecret;
impl CreateSecret {
pub fn new() -> Self {
Self
}
pub(crate) async fn orchestrate(
runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
input: crate::operation::create_secret::CreateSecretInput,
) -> ::std::result::Result<
crate::operation::create_secret::CreateSecretOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::create_secret::CreateSecretError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<
::aws_smithy_runtime_api::client::interceptors::context::Error,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>| {
err.map_service_error(|err| {
err.downcast::<crate::operation::create_secret::CreateSecretError>()
.expect("correct error type")
})
};
let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
.await
.map_err(map_err)?;
let output = context.finalize().map_err(map_err)?;
::std::result::Result::Ok(
output
.downcast::<crate::operation::create_secret::CreateSecretOutput>()
.expect("correct output type"),
)
}
pub(crate) async fn orchestrate_with_stop_point(
runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
input: crate::operation::create_secret::CreateSecretInput,
stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
) -> ::std::result::Result<
::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext,
::aws_smithy_runtime_api::client::result::SdkError<
::aws_smithy_runtime_api::client::interceptors::context::Error,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point("secretsmanager", "CreateSecret", input, runtime_plugins, stop_point).await
}
pub(crate) fn operation_runtime_plugins(
client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
client_config: &crate::config::Config,
config_override: ::std::option::Option<crate::config::Builder>,
) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
runtime_plugins = runtime_plugins
.with_operation_plugin(crate::client_idempotency_token::IdempotencyTokenRuntimePlugin::new(
|token_provider, input| {
let input: &mut crate::operation::create_secret::CreateSecretInput = input.downcast_mut().expect("correct type");
if input.client_request_token.is_none() {
input.client_request_token = ::std::option::Option::Some(token_provider.make_idempotency_token());
}
},
))
.with_client_plugin(crate::auth_plugin::DefaultAuthOptionsPlugin::new(vec![
::aws_runtime::auth::sigv4::SCHEME_ID,
]));
if let ::std::option::Option::Some(config_override) = config_override {
for plugin in config_override.runtime_plugins.iter().cloned() {
runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
}
runtime_plugins = runtime_plugins.with_operation_plugin(crate::config::ConfigOverrideRuntimePlugin::new(
config_override,
client_config.config.clone(),
&client_config.runtime_components,
));
}
runtime_plugins
}
}
impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for CreateSecret {
fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
let mut cfg = ::aws_smithy_types::config_bag::Layer::new("CreateSecret");
cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(
CreateSecretRequestSerializer,
));
cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(
CreateSecretResponseDeserializer,
));
cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
::aws_smithy_runtime_api::client::auth::static_resolver::StaticAuthSchemeOptionResolverParams::new(),
));
cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new(
"CreateSecret",
"secretsmanager",
));
let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
signing_options.double_uri_encode = true;
signing_options.content_sha256_header = false;
signing_options.normalize_uri_path = true;
signing_options.payload_override = None;
cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
signing_options,
..::std::default::Default::default()
});
::std::option::Option::Some(cfg.freeze())
}
fn runtime_components(
&self,
_: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder,
) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
#[allow(unused_mut)]
let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("CreateSecret")
.with_interceptor(::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default())
.with_interceptor(CreateSecretEndpointParamsInterceptor)
.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<
crate::operation::create_secret::CreateSecretError,
>::new())
.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<
crate::operation::create_secret::CreateSecretError,
>::new())
.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<
crate::operation::create_secret::CreateSecretError,
>::new());
::std::borrow::Cow::Owned(rcb)
}
}
#[derive(Debug)]
struct CreateSecretResponseDeserializer;
impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for CreateSecretResponseDeserializer {
fn deserialize_nonstreaming(
&self,
response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
let (success, status) = (response.status().is_success(), response.status().as_u16());
let headers = response.headers();
let body = response.body().bytes().expect("body loaded");
#[allow(unused_mut)]
let mut force_error = false;
::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
let parse_result = if !success && status != 200 || force_error {
crate::protocol_serde::shape_create_secret::de_create_secret_http_error(status, headers, body)
} else {
crate::protocol_serde::shape_create_secret::de_create_secret_http_response(status, headers, body)
};
crate::protocol_serde::type_erase_result(parse_result)
}
}
#[derive(Debug)]
struct CreateSecretRequestSerializer;
impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for CreateSecretRequestSerializer {
#[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
fn serialize_input(
&self,
input: ::aws_smithy_runtime_api::client::interceptors::context::Input,
_cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
let input = input
.downcast::<crate::operation::create_secret::CreateSecretInput>()
.expect("correct type");
let _header_serialization_settings = _cfg
.load::<crate::serialization_settings::HeaderSerializationSettings>()
.cloned()
.unwrap_or_default();
let mut request_builder = {
fn uri_base(
_input: &crate::operation::create_secret::CreateSecretInput,
output: &mut ::std::string::String,
) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
use ::std::fmt::Write as _;
::std::write!(output, "/").expect("formatting should succeed");
::std::result::Result::Ok(())
}
#[allow(clippy::unnecessary_wraps)]
fn update_http_builder(
input: &crate::operation::create_secret::CreateSecretInput,
builder: ::http::request::Builder,
) -> ::std::result::Result<::http::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
let mut uri = ::std::string::String::new();
uri_base(input, &mut uri)?;
::std::result::Result::Ok(builder.method("POST").uri(uri))
}
let mut builder = update_http_builder(&input, ::http::request::Builder::new())?;
builder = _header_serialization_settings.set_default_header(builder, ::http::header::CONTENT_TYPE, "application/x-amz-json-1.1");
builder = _header_serialization_settings.set_default_header(
builder,
::http::header::HeaderName::from_static("x-amz-target"),
"secretsmanager.CreateSecret",
);
builder
};
let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_create_secret::ser_create_secret_input(&input)?);
if let Some(content_length) = body.content_length() {
let content_length = content_length.to_string();
request_builder = _header_serialization_settings.set_default_header(request_builder, ::http::header::CONTENT_LENGTH, &content_length);
}
::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
}
}
#[derive(Debug)]
struct CreateSecretEndpointParamsInterceptor;
impl ::aws_smithy_runtime_api::client::interceptors::Intercept for CreateSecretEndpointParamsInterceptor {
fn name(&self) -> &'static str {
"CreateSecretEndpointParamsInterceptor"
}
fn read_before_execution(
&self,
context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<
'_,
::aws_smithy_runtime_api::client::interceptors::context::Input,
::aws_smithy_runtime_api::client::interceptors::context::Output,
::aws_smithy_runtime_api::client::interceptors::context::Error,
>,
cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
let _input = context
.input()
.downcast_ref::<CreateSecretInput>()
.ok_or("failed to downcast to CreateSecretInput")?;
let params = crate::config::endpoint::Params::builder()
.set_region(cfg.load::<::aws_types::region::Region>().map(|r| r.as_ref().to_owned()))
.set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
.set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
.set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
.build()
.map_err(|err| {
::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err)
})?;
cfg.interceptor_state()
.store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
::std::result::Result::Ok(())
}
}
#[non_exhaustive]
#[derive(::std::fmt::Debug)]
pub enum CreateSecretError {
DecryptionFailure(crate::types::error::DecryptionFailure),
EncryptionFailure(crate::types::error::EncryptionFailure),
InternalServiceError(crate::types::error::InternalServiceError),
InvalidParameterException(crate::types::error::InvalidParameterException),
InvalidRequestException(crate::types::error::InvalidRequestException),
LimitExceededException(crate::types::error::LimitExceededException),
MalformedPolicyDocumentException(crate::types::error::MalformedPolicyDocumentException),
PreconditionNotMetException(crate::types::error::PreconditionNotMetException),
ResourceExistsException(crate::types::error::ResourceExistsException),
ResourceNotFoundException(crate::types::error::ResourceNotFoundException),
#[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
variable wildcard pattern and check `.code()`:
\
`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
\
See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-CreateSecretError) for what information is available for the error.")]
Unhandled(crate::error::sealed_unhandled::Unhandled),
}
impl CreateSecretError {
pub fn unhandled(
err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>,
) -> Self {
Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
source: err.into(),
meta: ::std::default::Default::default(),
})
}
pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
source: err.clone().into(),
meta: err,
})
}
pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
match self {
Self::DecryptionFailure(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::EncryptionFailure(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::InternalServiceError(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::InvalidParameterException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::InvalidRequestException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::LimitExceededException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::MalformedPolicyDocumentException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::PreconditionNotMetException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::ResourceExistsException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::ResourceNotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::Unhandled(e) => &e.meta,
}
}
pub fn is_decryption_failure(&self) -> bool {
matches!(self, Self::DecryptionFailure(_))
}
pub fn is_encryption_failure(&self) -> bool {
matches!(self, Self::EncryptionFailure(_))
}
pub fn is_internal_service_error(&self) -> bool {
matches!(self, Self::InternalServiceError(_))
}
pub fn is_invalid_parameter_exception(&self) -> bool {
matches!(self, Self::InvalidParameterException(_))
}
pub fn is_invalid_request_exception(&self) -> bool {
matches!(self, Self::InvalidRequestException(_))
}
pub fn is_limit_exceeded_exception(&self) -> bool {
matches!(self, Self::LimitExceededException(_))
}
pub fn is_malformed_policy_document_exception(&self) -> bool {
matches!(self, Self::MalformedPolicyDocumentException(_))
}
pub fn is_precondition_not_met_exception(&self) -> bool {
matches!(self, Self::PreconditionNotMetException(_))
}
pub fn is_resource_exists_exception(&self) -> bool {
matches!(self, Self::ResourceExistsException(_))
}
pub fn is_resource_not_found_exception(&self) -> bool {
matches!(self, Self::ResourceNotFoundException(_))
}
}
impl ::std::error::Error for CreateSecretError {
fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
match self {
Self::DecryptionFailure(_inner) => ::std::option::Option::Some(_inner),
Self::EncryptionFailure(_inner) => ::std::option::Option::Some(_inner),
Self::InternalServiceError(_inner) => ::std::option::Option::Some(_inner),
Self::InvalidParameterException(_inner) => ::std::option::Option::Some(_inner),
Self::InvalidRequestException(_inner) => ::std::option::Option::Some(_inner),
Self::LimitExceededException(_inner) => ::std::option::Option::Some(_inner),
Self::MalformedPolicyDocumentException(_inner) => ::std::option::Option::Some(_inner),
Self::PreconditionNotMetException(_inner) => ::std::option::Option::Some(_inner),
Self::ResourceExistsException(_inner) => ::std::option::Option::Some(_inner),
Self::ResourceNotFoundException(_inner) => ::std::option::Option::Some(_inner),
Self::Unhandled(_inner) => ::std::option::Option::Some(&*_inner.source),
}
}
}
impl ::std::fmt::Display for CreateSecretError {
fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
match self {
Self::DecryptionFailure(_inner) => _inner.fmt(f),
Self::EncryptionFailure(_inner) => _inner.fmt(f),
Self::InternalServiceError(_inner) => _inner.fmt(f),
Self::InvalidParameterException(_inner) => _inner.fmt(f),
Self::InvalidRequestException(_inner) => _inner.fmt(f),
Self::LimitExceededException(_inner) => _inner.fmt(f),
Self::MalformedPolicyDocumentException(_inner) => _inner.fmt(f),
Self::PreconditionNotMetException(_inner) => _inner.fmt(f),
Self::ResourceExistsException(_inner) => _inner.fmt(f),
Self::ResourceNotFoundException(_inner) => _inner.fmt(f),
Self::Unhandled(_inner) => {
if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
write!(f, "unhandled error ({code})")
} else {
f.write_str("unhandled error")
}
}
}
}
}
impl ::aws_smithy_types::retry::ProvideErrorKind for CreateSecretError {
fn code(&self) -> ::std::option::Option<&str> {
::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
}
fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
::std::option::Option::None
}
}
impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for CreateSecretError {
fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
match self {
Self::DecryptionFailure(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::EncryptionFailure(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::InternalServiceError(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::InvalidParameterException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::InvalidRequestException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::LimitExceededException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::MalformedPolicyDocumentException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::PreconditionNotMetException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::ResourceExistsException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::ResourceNotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::Unhandled(_inner) => &_inner.meta,
}
}
}
impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for CreateSecretError {
fn create_unhandled_error(
source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>,
) -> Self {
Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
source,
meta: meta.unwrap_or_default(),
})
}
}
impl ::aws_types::request_id::RequestId for crate::operation::create_secret::CreateSecretError {
fn request_id(&self) -> Option<&str> {
self.meta().request_id()
}
}
pub use crate::operation::create_secret::_create_secret_output::CreateSecretOutput;
pub use crate::operation::create_secret::_create_secret_input::CreateSecretInput;
mod _create_secret_input;
mod _create_secret_output;
pub mod builders;