aws_db_esdk/deps/aws_cryptography_keyStore/
validation.rs

1// Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
2// SPDX-License-Identifier: Apache-2.0
3// Do not modify this file. This file is machine generated, and any changes to it will be overwritten.
4pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(
5    input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials,
6) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
7    validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(
8        &input.r#beacon_key_identifier,
9    )?;
10    validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(
11        &input.r#encryption_context,
12    )?;
13    validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(&input.r#beacon_key)?;
14    validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(&input.r#hmac_keys)?;
15    Ok(())
16}
17pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(
18    input: &::std::option::Option<::aws_smithy_types::Blob>,
19) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
20    if input.is_none() {
21        return ::std::result::Result::Ok(());
22    }
23    let input = input.as_ref().unwrap();
24
25    Ok(())
26}
27pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(
28    input: &::std::option::Option<::std::string::String>,
29) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
30    if input.is_none() {
31        return ::std::result::Result::Err(
32            ::aws_smithy_types::error::operation::BuildError::missing_field(
33                "beacon_key_identifier",
34                "beacon_key_identifier is required but was not specified",
35            ),
36        );
37    }
38    if input.is_none() {
39        return ::std::result::Result::Ok(());
40    }
41    let input = input.as_ref().unwrap();
42
43    Ok(())
44}
45pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(
46    input: &::std::option::Option<
47        ::std::collections::HashMap<::std::string::String, ::std::string::String>,
48    >,
49) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
50    if input.is_none() {
51        return ::std::result::Result::Err(
52            ::aws_smithy_types::error::operation::BuildError::missing_field(
53                "encryption_context",
54                "encryption_context is required but was not specified",
55            ),
56        );
57    }
58    if input.is_none() {
59        return ::std::result::Result::Ok(());
60    }
61    let input = input.as_ref().unwrap();
62
63    validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?;
64    Ok(())
65}
66pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(
67    input: &::std::option::Option<
68        ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>,
69    >,
70) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
71    if input.is_none() {
72        return ::std::result::Result::Ok(());
73    }
74    let input = input.as_ref().unwrap();
75
76    validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input)?;
77    Ok(())
78}
79pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(
80    input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials,
81) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
82    validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(
83        &input.r#branch_key_identifier,
84    )?;
85    validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(
86        &input.r#branch_key_version,
87    )?;
88    validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(
89        &input.r#encryption_context,
90    )?;
91    validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(&input.r#branch_key)?;
92    Ok(())
93}
94pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(
95    input: &::std::option::Option<::aws_smithy_types::Blob>,
96) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
97    if input.is_none() {
98        return ::std::result::Result::Err(
99            ::aws_smithy_types::error::operation::BuildError::missing_field(
100                "branch_key",
101                "branch_key is required but was not specified",
102            ),
103        );
104    }
105    if input.is_none() {
106        return ::std::result::Result::Ok(());
107    }
108    let input = input.as_ref().unwrap();
109
110    Ok(())
111}
112pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(
113    input: &::std::option::Option<::std::string::String>,
114) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
115    if input.is_none() {
116        return ::std::result::Result::Err(
117            ::aws_smithy_types::error::operation::BuildError::missing_field(
118                "branch_key_identifier",
119                "branch_key_identifier is required but was not specified",
120            ),
121        );
122    }
123    if input.is_none() {
124        return ::std::result::Result::Ok(());
125    }
126    let input = input.as_ref().unwrap();
127
128    Ok(())
129}
130pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(
131    input: &::std::option::Option<::std::string::String>,
132) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
133    if input.is_none() {
134        return ::std::result::Result::Err(
135            ::aws_smithy_types::error::operation::BuildError::missing_field(
136                "branch_key_version",
137                "branch_key_version is required but was not specified",
138            ),
139        );
140    }
141    if input.is_none() {
142        return ::std::result::Result::Ok(());
143    }
144    let input = input.as_ref().unwrap();
145
146    Ok(())
147}
148pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(
149    input: &::std::option::Option<
150        ::std::collections::HashMap<::std::string::String, ::std::string::String>,
151    >,
152) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
153    if input.is_none() {
154        return ::std::result::Result::Err(
155            ::aws_smithy_types::error::operation::BuildError::missing_field(
156                "encryption_context",
157                "encryption_context is required but was not specified",
158            ),
159        );
160    }
161    if input.is_none() {
162        return ::std::result::Result::Ok(());
163    }
164    let input = input.as_ref().unwrap();
165
166    validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?;
167    Ok(())
168}
169pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput(
170    input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyInput,
171) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
172    validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(
173        &input.r#branch_key_identifier,
174    )?;
175    validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(
176        &input.r#encryption_context,
177    )?;
178    Ok(())
179}
180pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_for_KeyStore_CreateKey(
181    input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput,
182) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
183    validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(
184        &input.r#branch_key_identifier,
185    )?;
186    validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(
187        &input.r#encryption_context,
188    )?;
189    Ok(())
190}
191pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(
192    input: &::std::option::Option<::std::string::String>,
193) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
194    if input.is_none() {
195        return ::std::result::Result::Ok(());
196    }
197    let input = input.as_ref().unwrap();
198
199    Ok(())
200}
201pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(
202    input: &::std::option::Option<
203        ::std::collections::HashMap<::std::string::String, ::std::string::String>,
204    >,
205) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
206    if input.is_none() {
207        return ::std::result::Result::Ok(());
208    }
209    let input = input.as_ref().unwrap();
210
211    validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?;
212    Ok(())
213}
214pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput(
215    input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput,
216) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
217    validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(
218        &input.r#branch_key_identifier,
219    )?;
220    Ok(())
221}
222pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_for_KeyStore_CreateKey(
223    input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput,
224) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
225    validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(
226        &input.r#branch_key_identifier,
227    )?;
228    Ok(())
229}
230pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(
231    input: &::std::option::Option<::std::string::String>,
232) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
233    if input.is_none() {
234        return ::std::result::Result::Err(
235            ::aws_smithy_types::error::operation::BuildError::missing_field(
236                "branch_key_identifier",
237                "branch_key_identifier is required but was not specified",
238            ),
239        );
240    }
241    if input.is_none() {
242        return ::std::result::Result::Ok(());
243    }
244    let input = input.as_ref().unwrap();
245
246    Ok(())
247}
248pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput(
249    input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput,
250) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
251    Ok(())
252}
253pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput_for_KeyStore_CreateKeyStore(
254    input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreInput,
255) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
256    Ok(())
257}
258pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput(
259    input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput,
260) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
261    validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.r#table_arn)?;
262    Ok(())
263}
264pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_for_KeyStore_CreateKeyStore(
265    input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreOutput,
266) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
267    validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.r#table_arn)?;
268    Ok(())
269}
270pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(
271    input: &::std::option::Option<::std::string::String>,
272) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
273    if input.is_none() {
274        return ::std::result::Result::Err(
275            ::aws_smithy_types::error::operation::BuildError::missing_field(
276                "table_arn",
277                "table_arn is required but was not specified",
278            ),
279        );
280    }
281    if input.is_none() {
282        return ::std::result::Result::Ok(());
283    }
284    let input = input.as_ref().unwrap();
285
286    if !(1..=1024).contains(
287        &input
288            .chars()
289            .map(::std::primitive::char::len_utf16)
290            .fold(0usize, ::std::ops::Add::add),
291    ) {
292        return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
293        "table_arn",
294        "table_arn failed to satisfy constraint: Member must have length between 1 and 1024, inclusive",
295    ));
296    }
297    Ok(())
298}
299pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDdbClientReference(
300    input: &crate::deps::com_amazonaws_dynamodb::client::Client,
301) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
302    Ok(())
303}
304pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDiscovery(
305    input: &crate::deps::aws_cryptography_keyStore::types::Discovery,
306) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
307    Ok(())
308}
309pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext(
310    input: &::std::collections::HashMap<::std::string::String, ::std::string::String>,
311) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
312    for (inner_key, inner_val) in input.iter() {
313        validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(inner_key)?;
314        validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(inner_val)?;
315    }
316    Ok(())
317}
318pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(
319    input: &::std::string::String,
320) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
321    Ok(())
322}
323pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(
324    input: &::std::string::String,
325) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
326    Ok(())
327}
328pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput(
329    input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput,
330) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
331    validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(
332        &input.r#branch_key_identifier,
333    )?;
334    Ok(())
335}
336pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_for_KeyStore_GetActiveBranchKey(
337    input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput,
338) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
339    validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(
340        &input.r#branch_key_identifier,
341    )?;
342    Ok(())
343}
344pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(
345    input: &::std::option::Option<::std::string::String>,
346) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
347    if input.is_none() {
348        return ::std::result::Result::Err(
349            ::aws_smithy_types::error::operation::BuildError::missing_field(
350                "branch_key_identifier",
351                "branch_key_identifier is required but was not specified",
352            ),
353        );
354    }
355    if input.is_none() {
356        return ::std::result::Result::Ok(());
357    }
358    let input = input.as_ref().unwrap();
359
360    Ok(())
361}
362pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput(
363    input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput,
364) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
365    validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(
366        &input.r#branch_key_materials,
367    )?;
368    Ok(())
369}
370pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_for_KeyStore_GetActiveBranchKey(
371    input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput,
372) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
373    validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(
374        &input.r#branch_key_materials,
375    )?;
376    Ok(())
377}
378pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(
379    input: &::std::option::Option<
380        crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials,
381    >,
382) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
383    if input.is_none() {
384        return ::std::result::Result::Err(
385            ::aws_smithy_types::error::operation::BuildError::missing_field(
386                "branch_key_materials",
387                "branch_key_materials is required but was not specified",
388            ),
389        );
390    }
391    if input.is_none() {
392        return ::std::result::Result::Ok(());
393    }
394    let input = input.as_ref().unwrap();
395
396    validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?;
397    Ok(())
398}
399pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput(
400    input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput,
401) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
402    validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(
403        &input.r#branch_key_identifier,
404    )?;
405    Ok(())
406}
407pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_for_KeyStore_GetBeaconKey(
408    input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput,
409) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
410    validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(
411        &input.r#branch_key_identifier,
412    )?;
413    Ok(())
414}
415pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(
416    input: &::std::option::Option<::std::string::String>,
417) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
418    if input.is_none() {
419        return ::std::result::Result::Err(
420            ::aws_smithy_types::error::operation::BuildError::missing_field(
421                "branch_key_identifier",
422                "branch_key_identifier is required but was not specified",
423            ),
424        );
425    }
426    if input.is_none() {
427        return ::std::result::Result::Ok(());
428    }
429    let input = input.as_ref().unwrap();
430
431    Ok(())
432}
433pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput(
434    input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput,
435) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
436    validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(
437        &input.r#beacon_key_materials,
438    )?;
439    Ok(())
440}
441pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_for_KeyStore_GetBeaconKey(
442    input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput,
443) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
444    validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(
445        &input.r#beacon_key_materials,
446    )?;
447    Ok(())
448}
449pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(
450    input: &::std::option::Option<
451        crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials,
452    >,
453) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
454    if input.is_none() {
455        return ::std::result::Result::Err(
456            ::aws_smithy_types::error::operation::BuildError::missing_field(
457                "beacon_key_materials",
458                "beacon_key_materials is required but was not specified",
459            ),
460        );
461    }
462    if input.is_none() {
463        return ::std::result::Result::Ok(());
464    }
465    let input = input.as_ref().unwrap();
466
467    validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input)?;
468    Ok(())
469}
470pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput(
471    input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput,
472) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
473    validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(
474        &input.r#branch_key_identifier,
475    )?;
476    validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(
477        &input.r#branch_key_version,
478    )?;
479    Ok(())
480}
481pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_for_KeyStore_GetBranchKeyVersion(
482    input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput,
483) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
484    validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(
485        &input.r#branch_key_identifier,
486    )?;
487    validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(
488        &input.r#branch_key_version,
489    )?;
490    Ok(())
491}
492pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(
493    input: &::std::option::Option<::std::string::String>,
494) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
495    if input.is_none() {
496        return ::std::result::Result::Err(
497            ::aws_smithy_types::error::operation::BuildError::missing_field(
498                "branch_key_identifier",
499                "branch_key_identifier is required but was not specified",
500            ),
501        );
502    }
503    if input.is_none() {
504        return ::std::result::Result::Ok(());
505    }
506    let input = input.as_ref().unwrap();
507
508    Ok(())
509}
510pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(
511    input: &::std::option::Option<::std::string::String>,
512) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
513    if input.is_none() {
514        return ::std::result::Result::Err(
515            ::aws_smithy_types::error::operation::BuildError::missing_field(
516                "branch_key_version",
517                "branch_key_version is required but was not specified",
518            ),
519        );
520    }
521    if input.is_none() {
522        return ::std::result::Result::Ok(());
523    }
524    let input = input.as_ref().unwrap();
525
526    Ok(())
527}
528pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput(
529    input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput,
530) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
531    validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(
532        &input.r#branch_key_materials,
533    )?;
534    Ok(())
535}
536pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_for_KeyStore_GetBranchKeyVersion(
537    input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput,
538) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
539    validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(
540        &input.r#branch_key_materials,
541    )?;
542    Ok(())
543}
544pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(
545    input: &::std::option::Option<
546        crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials,
547    >,
548) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
549    if input.is_none() {
550        return ::std::result::Result::Err(
551            ::aws_smithy_types::error::operation::BuildError::missing_field(
552                "branch_key_materials",
553                "branch_key_materials is required but was not specified",
554            ),
555        );
556    }
557    if input.is_none() {
558        return ::std::result::Result::Ok(());
559    }
560    let input = input.as_ref().unwrap();
561
562    validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?;
563    Ok(())
564}
565pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput(
566    input: &crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput,
567) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
568    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.r#key_store_id)?;
569    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(
570        &input.r#key_store_name,
571    )?;
572    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(
573        &input.r#logical_key_store_name,
574    )?;
575    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(
576        &input.r#grant_tokens,
577    )?;
578    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(
579        &input.r#kms_configuration,
580    )?;
581    Ok(())
582}
583pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_for_KeyStore_GetKeyStoreInfo(
584    input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput,
585) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
586    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.r#key_store_id)?;
587    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(
588        &input.r#key_store_name,
589    )?;
590    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(
591        &input.r#logical_key_store_name,
592    )?;
593    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(
594        &input.r#grant_tokens,
595    )?;
596    validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(
597        &input.r#kms_configuration,
598    )?;
599    Ok(())
600}
601pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(
602    input: &::std::option::Option<::std::vec::Vec<::std::string::String>>,
603) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
604    if input.is_none() {
605        return ::std::result::Result::Err(
606            ::aws_smithy_types::error::operation::BuildError::missing_field(
607                "grant_tokens",
608                "grant_tokens is required but was not specified",
609            ),
610        );
611    }
612    if input.is_none() {
613        return ::std::result::Result::Ok(());
614    }
615    let input = input.as_ref().unwrap();
616
617    validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?;
618    Ok(())
619}
620pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(
621    input: &::std::option::Option<::std::string::String>,
622) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
623    if input.is_none() {
624        return ::std::result::Result::Err(
625            ::aws_smithy_types::error::operation::BuildError::missing_field(
626                "key_store_id",
627                "key_store_id is required but was not specified",
628            ),
629        );
630    }
631    if input.is_none() {
632        return ::std::result::Result::Ok(());
633    }
634    let input = input.as_ref().unwrap();
635
636    Ok(())
637}
638pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(
639    input: &::std::option::Option<::std::string::String>,
640) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
641    if input.is_none() {
642        return ::std::result::Result::Err(
643            ::aws_smithy_types::error::operation::BuildError::missing_field(
644                "key_store_name",
645                "key_store_name is required but was not specified",
646            ),
647        );
648    }
649    if input.is_none() {
650        return ::std::result::Result::Ok(());
651    }
652    let input = input.as_ref().unwrap();
653
654    if !(3..=255).contains(
655        &input
656            .chars()
657            .map(::std::primitive::char::len_utf16)
658            .fold(0usize, ::std::ops::Add::add),
659    ) {
660        return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
661        "key_store_name",
662        "key_store_name failed to satisfy constraint: Member must have length between 3 and 255, inclusive",
663    ));
664    }
665    Ok(())
666}
667pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(
668    input: &::std::option::Option<crate::deps::aws_cryptography_keyStore::types::KmsConfiguration>,
669) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
670    if input.is_none() {
671        return ::std::result::Result::Err(
672            ::aws_smithy_types::error::operation::BuildError::missing_field(
673                "kms_configuration",
674                "kms_configuration is required but was not specified",
675            ),
676        );
677    }
678    if input.is_none() {
679        return ::std::result::Result::Ok(());
680    }
681    let input = input.as_ref().unwrap();
682
683    validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?;
684    Ok(())
685}
686pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(
687    input: &::std::option::Option<::std::string::String>,
688) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
689    if input.is_none() {
690        return ::std::result::Result::Err(
691            ::aws_smithy_types::error::operation::BuildError::missing_field(
692                "logical_key_store_name",
693                "logical_key_store_name is required but was not specified",
694            ),
695        );
696    }
697    if input.is_none() {
698        return ::std::result::Result::Ok(());
699    }
700    let input = input.as_ref().unwrap();
701
702    Ok(())
703}
704pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList(
705    input: &::std::vec::Vec<::std::string::String>,
706) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
707    for inner in input.iter() {
708        validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(inner)?;
709    }
710    Ok(())
711}
712pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(
713    input: &::std::string::String,
714) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
715    Ok(())
716}
717pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(
718    input: &::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>,
719) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
720    for (inner_key, inner_val) in input.iter() {
721        validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(inner_key)?;
722        validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(inner_val)?;
723    }
724    Ok(())
725}
726pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(
727    input: &::std::string::String,
728) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
729    Ok(())
730}
731pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(
732    input: &::aws_smithy_types::Blob,
733) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
734    Ok(())
735}
736pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig(
737    input: &crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig,
738) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
739    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(&input.r#ddb_table_name)?;
740    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration(
741        &input.r#kms_configuration,
742    )?;
743    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName(
744        &input.r#logical_key_store_name,
745    )?;
746    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(&input.r#id)?;
747    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(&input.r#grant_tokens)?;
748    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(&input.r#ddb_client)?;
749    validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(&input.r#kms_client)?;
750    Ok(())
751}
752pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(
753    input: &::std::option::Option<crate::deps::com_amazonaws_dynamodb::client::Client>,
754) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
755    if input.is_none() {
756        return ::std::result::Result::Ok(());
757    }
758    let input = input.as_ref().unwrap();
759
760    validate_aws_Pcryptography_PkeyStore_HDdbClientReference(input)?;
761    Ok(())
762}
763pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(
764    input: &::std::option::Option<::std::string::String>,
765) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
766    if input.is_none() {
767        return ::std::result::Result::Err(
768            ::aws_smithy_types::error::operation::BuildError::missing_field(
769                "ddb_table_name",
770                "ddb_table_name is required but was not specified",
771            ),
772        );
773    }
774    if input.is_none() {
775        return ::std::result::Result::Ok(());
776    }
777    let input = input.as_ref().unwrap();
778
779    if !(3..=255).contains(
780        &input
781            .chars()
782            .map(::std::primitive::char::len_utf16)
783            .fold(0usize, ::std::ops::Add::add),
784    ) {
785        return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
786        "ddb_table_name",
787        "ddb_table_name failed to satisfy constraint: Member must have length between 3 and 255, inclusive",
788    ));
789    }
790    Ok(())
791}
792pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(
793    input: &::std::option::Option<::std::vec::Vec<::std::string::String>>,
794) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
795    if input.is_none() {
796        return ::std::result::Result::Ok(());
797    }
798    let input = input.as_ref().unwrap();
799
800    validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?;
801    Ok(())
802}
803pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(
804    input: &::std::option::Option<::std::string::String>,
805) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
806    if input.is_none() {
807        return ::std::result::Result::Ok(());
808    }
809    let input = input.as_ref().unwrap();
810
811    Ok(())
812}
813pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(
814    input: &::std::option::Option<crate::deps::com_amazonaws_kms::client::Client>,
815) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
816    if input.is_none() {
817        return ::std::result::Result::Ok(());
818    }
819    let input = input.as_ref().unwrap();
820
821    validate_aws_Pcryptography_PkeyStore_HKmsClientReference(input)?;
822    Ok(())
823}
824pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration(
825    input: &::std::option::Option<crate::deps::aws_cryptography_keyStore::types::KmsConfiguration>,
826) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
827    if input.is_none() {
828        return ::std::result::Result::Err(
829            ::aws_smithy_types::error::operation::BuildError::missing_field(
830                "kms_configuration",
831                "kms_configuration is required but was not specified",
832            ),
833        );
834    }
835    if input.is_none() {
836        return ::std::result::Result::Ok(());
837    }
838    let input = input.as_ref().unwrap();
839
840    validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?;
841    Ok(())
842}
843pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName(
844    input: &::std::option::Option<::std::string::String>,
845) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
846    if input.is_none() {
847        return ::std::result::Result::Err(
848            ::aws_smithy_types::error::operation::BuildError::missing_field(
849                "logical_key_store_name",
850                "logical_key_store_name is required but was not specified",
851            ),
852        );
853    }
854    if input.is_none() {
855        return ::std::result::Result::Ok(());
856    }
857    let input = input.as_ref().unwrap();
858
859    Ok(())
860}
861pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKmsClientReference(
862    input: &crate::deps::com_amazonaws_kms::client::Client,
863) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
864    Ok(())
865}
866pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(
867    input: &crate::deps::aws_cryptography_keyStore::types::KmsConfiguration,
868) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
869    if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(ref inner) =
870        &input
871    {
872        validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(inner)?;
873    }
874    if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn(ref inner) =
875        &input
876    {
877        validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(inner)?;
878    }
879    if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery(ref inner) =
880        &input
881    {
882        validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(inner)?;
883    }
884    if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(ref inner) =
885        &input
886    {
887        validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(inner)?;
888    }
889    Ok(())
890}
891pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(
892    input: &crate::deps::aws_cryptography_keyStore::types::Discovery,
893) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
894    validate_aws_Pcryptography_PkeyStore_HDiscovery(input)?;
895    Ok(())
896}
897pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(
898    input: &::std::string::String,
899) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
900    if !(1..=2048).contains(
901        &input
902            .chars()
903            .map(::std::primitive::char::len_utf16)
904            .fold(0usize, ::std::ops::Add::add),
905    ) {
906        return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
907        "kms_key_arn",
908        "kms_key_arn failed to satisfy constraint: Member must have length between 1 and 2048, inclusive",
909    ));
910    }
911    Ok(())
912}
913pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(
914    input: &::std::string::String,
915) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
916    if !(1..=2048).contains(
917        &input
918            .chars()
919            .map(::std::primitive::char::len_utf16)
920            .fold(0usize, ::std::ops::Add::add),
921    ) {
922        return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
923        "kms_mr_key_arn",
924        "kms_mr_key_arn failed to satisfy constraint: Member must have length between 1 and 2048, inclusive",
925    ));
926    }
927    Ok(())
928}
929pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(
930    input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery,
931) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
932    validate_aws_Pcryptography_PkeyStore_HMRDiscovery(input)?;
933    Ok(())
934}
935pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery(
936    input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery,
937) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
938    validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(&input.r#region)?;
939    Ok(())
940}
941pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(
942    input: &::std::option::Option<::std::string::String>,
943) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
944    if input.is_none() {
945        return ::std::result::Result::Err(
946            ::aws_smithy_types::error::operation::BuildError::missing_field(
947                "region",
948                "region is required but was not specified",
949            ),
950        );
951    }
952    if input.is_none() {
953        return ::std::result::Result::Ok(());
954    }
955    let input = input.as_ref().unwrap();
956
957    if !(1..=32).contains(
958        &input
959            .chars()
960            .map(::std::primitive::char::len_utf16)
961            .fold(0usize, ::std::ops::Add::add),
962    ) {
963        return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
964        "region",
965        "region failed to satisfy constraint: Member must have length between 1 and 32, inclusive",
966    ));
967    }
968    Ok(())
969}
970pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput(
971    input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyInput,
972) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
973    validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(
974        &input.r#branch_key_identifier,
975    )?;
976    Ok(())
977}
978pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_for_KeyStore_VersionKey(
979    input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput,
980) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
981    validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(
982        &input.r#branch_key_identifier,
983    )?;
984    Ok(())
985}
986pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(
987    input: &::std::option::Option<::std::string::String>,
988) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
989    if input.is_none() {
990        return ::std::result::Result::Err(
991            ::aws_smithy_types::error::operation::BuildError::missing_field(
992                "branch_key_identifier",
993                "branch_key_identifier is required but was not specified",
994            ),
995        );
996    }
997    if input.is_none() {
998        return ::std::result::Result::Ok(());
999    }
1000    let input = input.as_ref().unwrap();
1001
1002    Ok(())
1003}
1004pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput(
1005    input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput,
1006) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1007    Ok(())
1008}
1009pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput_for_KeyStore_VersionKey(
1010    input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput,
1011) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1012    Ok(())
1013}
1014pub(crate) fn validate_smithy_Papi_HUnit(
1015    input: &(),
1016) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1017    Ok(())
1018}
1019pub(crate) fn validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo(
1020    input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit,
1021) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1022    Ok(())
1023}