aws_sdk_kms/protocol_serde/
shape_re_encrypt.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2#[allow(clippy::unnecessary_wraps)]
3pub fn de_re_encrypt_http_error(
4    _response_status: u16,
5    _response_headers: &::aws_smithy_runtime_api::http::Headers,
6    _response_body: &[u8],
7) -> std::result::Result<crate::operation::re_encrypt::ReEncryptOutput, crate::operation::re_encrypt::ReEncryptError> {
8    #[allow(unused_mut)]
9    let mut generic_builder = crate::protocol_serde::parse_http_error_metadata(_response_status, _response_headers, _response_body)
10        .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
11    generic_builder = ::aws_types::request_id::apply_request_id(generic_builder, _response_headers);
12    let generic = generic_builder.build();
13    let error_code = match generic.code() {
14        Some(code) => code,
15        None => return Err(crate::operation::re_encrypt::ReEncryptError::unhandled(generic)),
16    };
17
18    let _error_message = generic.message().map(|msg| msg.to_owned());
19    Err(match error_code {
20        "DependencyTimeoutException" => crate::operation::re_encrypt::ReEncryptError::DependencyTimeoutException({
21            #[allow(unused_mut)]
22            let mut tmp = {
23                #[allow(unused_mut)]
24                let mut output = crate::types::error::builders::DependencyTimeoutExceptionBuilder::default();
25                output = crate::protocol_serde::shape_dependency_timeout_exception::de_dependency_timeout_exception_json_err(_response_body, output)
26                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
27                let output = output.meta(generic);
28                output.build()
29            };
30            if tmp.message.is_none() {
31                tmp.message = _error_message;
32            }
33            tmp
34        }),
35        "DisabledException" => crate::operation::re_encrypt::ReEncryptError::DisabledException({
36            #[allow(unused_mut)]
37            let mut tmp = {
38                #[allow(unused_mut)]
39                let mut output = crate::types::error::builders::DisabledExceptionBuilder::default();
40                output = crate::protocol_serde::shape_disabled_exception::de_disabled_exception_json_err(_response_body, output)
41                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
42                let output = output.meta(generic);
43                output.build()
44            };
45            if tmp.message.is_none() {
46                tmp.message = _error_message;
47            }
48            tmp
49        }),
50        "DryRunOperationException" => crate::operation::re_encrypt::ReEncryptError::DryRunOperationException({
51            #[allow(unused_mut)]
52            let mut tmp = {
53                #[allow(unused_mut)]
54                let mut output = crate::types::error::builders::DryRunOperationExceptionBuilder::default();
55                output = crate::protocol_serde::shape_dry_run_operation_exception::de_dry_run_operation_exception_json_err(_response_body, output)
56                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
57                let output = output.meta(generic);
58                output.build()
59            };
60            if tmp.message.is_none() {
61                tmp.message = _error_message;
62            }
63            tmp
64        }),
65        "IncorrectKeyException" => crate::operation::re_encrypt::ReEncryptError::IncorrectKeyException({
66            #[allow(unused_mut)]
67            let mut tmp = {
68                #[allow(unused_mut)]
69                let mut output = crate::types::error::builders::IncorrectKeyExceptionBuilder::default();
70                output = crate::protocol_serde::shape_incorrect_key_exception::de_incorrect_key_exception_json_err(_response_body, output)
71                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
72                let output = output.meta(generic);
73                output.build()
74            };
75            if tmp.message.is_none() {
76                tmp.message = _error_message;
77            }
78            tmp
79        }),
80        "InvalidCiphertextException" => crate::operation::re_encrypt::ReEncryptError::InvalidCiphertextException({
81            #[allow(unused_mut)]
82            let mut tmp = {
83                #[allow(unused_mut)]
84                let mut output = crate::types::error::builders::InvalidCiphertextExceptionBuilder::default();
85                output = crate::protocol_serde::shape_invalid_ciphertext_exception::de_invalid_ciphertext_exception_json_err(_response_body, output)
86                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
87                let output = output.meta(generic);
88                output.build()
89            };
90            if tmp.message.is_none() {
91                tmp.message = _error_message;
92            }
93            tmp
94        }),
95        "InvalidGrantTokenException" => crate::operation::re_encrypt::ReEncryptError::InvalidGrantTokenException({
96            #[allow(unused_mut)]
97            let mut tmp = {
98                #[allow(unused_mut)]
99                let mut output = crate::types::error::builders::InvalidGrantTokenExceptionBuilder::default();
100                output =
101                    crate::protocol_serde::shape_invalid_grant_token_exception::de_invalid_grant_token_exception_json_err(_response_body, output)
102                        .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
103                let output = output.meta(generic);
104                output.build()
105            };
106            if tmp.message.is_none() {
107                tmp.message = _error_message;
108            }
109            tmp
110        }),
111        "InvalidKeyUsageException" => crate::operation::re_encrypt::ReEncryptError::InvalidKeyUsageException({
112            #[allow(unused_mut)]
113            let mut tmp = {
114                #[allow(unused_mut)]
115                let mut output = crate::types::error::builders::InvalidKeyUsageExceptionBuilder::default();
116                output = crate::protocol_serde::shape_invalid_key_usage_exception::de_invalid_key_usage_exception_json_err(_response_body, output)
117                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
118                let output = output.meta(generic);
119                output.build()
120            };
121            if tmp.message.is_none() {
122                tmp.message = _error_message;
123            }
124            tmp
125        }),
126        "KeyUnavailableException" => crate::operation::re_encrypt::ReEncryptError::KeyUnavailableException({
127            #[allow(unused_mut)]
128            let mut tmp = {
129                #[allow(unused_mut)]
130                let mut output = crate::types::error::builders::KeyUnavailableExceptionBuilder::default();
131                output = crate::protocol_serde::shape_key_unavailable_exception::de_key_unavailable_exception_json_err(_response_body, output)
132                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
133                let output = output.meta(generic);
134                output.build()
135            };
136            if tmp.message.is_none() {
137                tmp.message = _error_message;
138            }
139            tmp
140        }),
141        "KMSInternalException" => crate::operation::re_encrypt::ReEncryptError::KmsInternalException({
142            #[allow(unused_mut)]
143            let mut tmp = {
144                #[allow(unused_mut)]
145                let mut output = crate::types::error::builders::KmsInternalExceptionBuilder::default();
146                output = crate::protocol_serde::shape_kms_internal_exception::de_kms_internal_exception_json_err(_response_body, output)
147                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
148                let output = output.meta(generic);
149                output.build()
150            };
151            if tmp.message.is_none() {
152                tmp.message = _error_message;
153            }
154            tmp
155        }),
156        "KMSInvalidStateException" => crate::operation::re_encrypt::ReEncryptError::KmsInvalidStateException({
157            #[allow(unused_mut)]
158            let mut tmp = {
159                #[allow(unused_mut)]
160                let mut output = crate::types::error::builders::KmsInvalidStateExceptionBuilder::default();
161                output = crate::protocol_serde::shape_kms_invalid_state_exception::de_kms_invalid_state_exception_json_err(_response_body, output)
162                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
163                let output = output.meta(generic);
164                output.build()
165            };
166            if tmp.message.is_none() {
167                tmp.message = _error_message;
168            }
169            tmp
170        }),
171        "NotFoundException" => crate::operation::re_encrypt::ReEncryptError::NotFoundException({
172            #[allow(unused_mut)]
173            let mut tmp = {
174                #[allow(unused_mut)]
175                let mut output = crate::types::error::builders::NotFoundExceptionBuilder::default();
176                output = crate::protocol_serde::shape_not_found_exception::de_not_found_exception_json_err(_response_body, output)
177                    .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
178                let output = output.meta(generic);
179                output.build()
180            };
181            if tmp.message.is_none() {
182                tmp.message = _error_message;
183            }
184            tmp
185        }),
186        _ => crate::operation::re_encrypt::ReEncryptError::generic(generic),
187    })
188}
189
190#[allow(clippy::unnecessary_wraps)]
191pub fn de_re_encrypt_http_response(
192    _response_status: u16,
193    _response_headers: &::aws_smithy_runtime_api::http::Headers,
194    _response_body: &[u8],
195) -> std::result::Result<crate::operation::re_encrypt::ReEncryptOutput, crate::operation::re_encrypt::ReEncryptError> {
196    Ok({
197        #[allow(unused_mut)]
198        let mut output = crate::operation::re_encrypt::builders::ReEncryptOutputBuilder::default();
199        output = crate::protocol_serde::shape_re_encrypt::de_re_encrypt(_response_body, output)
200            .map_err(crate::operation::re_encrypt::ReEncryptError::unhandled)?;
201        output._set_request_id(::aws_types::request_id::RequestId::request_id(_response_headers).map(str::to_string));
202        output.build()
203    })
204}
205
206pub fn ser_re_encrypt_input(
207    input: &crate::operation::re_encrypt::ReEncryptInput,
208) -> ::std::result::Result<::aws_smithy_types::body::SdkBody, ::aws_smithy_types::error::operation::SerializationError> {
209    let mut out = String::new();
210    let mut object = ::aws_smithy_json::serialize::JsonObjectWriter::new(&mut out);
211    crate::protocol_serde::shape_re_encrypt_input::ser_re_encrypt_input_input(&mut object, input)?;
212    object.finish();
213    Ok(::aws_smithy_types::body::SdkBody::from(out))
214}
215
216pub(crate) fn de_re_encrypt(
217    value: &[u8],
218    mut builder: crate::operation::re_encrypt::builders::ReEncryptOutputBuilder,
219) -> ::std::result::Result<crate::operation::re_encrypt::builders::ReEncryptOutputBuilder, ::aws_smithy_json::deserialize::error::DeserializeError> {
220    let mut tokens_owned = ::aws_smithy_json::deserialize::json_token_iter(crate::protocol_serde::or_empty_doc(value)).peekable();
221    let tokens = &mut tokens_owned;
222    ::aws_smithy_json::deserialize::token::expect_start_object(tokens.next())?;
223    loop {
224        match tokens.next().transpose()? {
225            Some(::aws_smithy_json::deserialize::Token::EndObject { .. }) => break,
226            Some(::aws_smithy_json::deserialize::Token::ObjectKey { key, .. }) => match key.to_unescaped()?.as_ref() {
227                "CiphertextBlob" => {
228                    builder = builder.set_ciphertext_blob(::aws_smithy_json::deserialize::token::expect_blob_or_null(tokens.next())?);
229                }
230                "SourceKeyId" => {
231                    builder = builder.set_source_key_id(
232                        ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
233                            .map(|s| s.to_unescaped().map(|u| u.into_owned()))
234                            .transpose()?,
235                    );
236                }
237                "KeyId" => {
238                    builder = builder.set_key_id(
239                        ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
240                            .map(|s| s.to_unescaped().map(|u| u.into_owned()))
241                            .transpose()?,
242                    );
243                }
244                "SourceEncryptionAlgorithm" => {
245                    builder = builder.set_source_encryption_algorithm(
246                        ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
247                            .map(|s| s.to_unescaped().map(|u| crate::types::EncryptionAlgorithmSpec::from(u.as_ref())))
248                            .transpose()?,
249                    );
250                }
251                "DestinationEncryptionAlgorithm" => {
252                    builder = builder.set_destination_encryption_algorithm(
253                        ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
254                            .map(|s| s.to_unescaped().map(|u| crate::types::EncryptionAlgorithmSpec::from(u.as_ref())))
255                            .transpose()?,
256                    );
257                }
258                "SourceKeyMaterialId" => {
259                    builder = builder.set_source_key_material_id(
260                        ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
261                            .map(|s| s.to_unescaped().map(|u| u.into_owned()))
262                            .transpose()?,
263                    );
264                }
265                "DestinationKeyMaterialId" => {
266                    builder = builder.set_destination_key_material_id(
267                        ::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
268                            .map(|s| s.to_unescaped().map(|u| u.into_owned()))
269                            .transpose()?,
270                    );
271                }
272                _ => ::aws_smithy_json::deserialize::token::skip_value(tokens)?,
273            },
274            other => {
275                return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(format!(
276                    "expected object key or end object, found: {other:?}"
277                )))
278            }
279        }
280    }
281    if tokens.next().is_some() {
282        return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(
283            "found more JSON tokens after completing parsing",
284        ));
285    }
286    Ok(builder)
287}