1pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(
5 input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials,
6) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
7 validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(
8 &input.r#beacon_key_identifier,
9 )?;
10 validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(
11 &input.r#encryption_context,
12 )?;
13 validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(&input.r#beacon_key)?;
14 validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(&input.r#hmac_keys)?;
15 Ok(())
16}
17pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(
18 input: &::std::option::Option<::aws_smithy_types::Blob>,
19) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
20 if input.is_none() {
21 return ::std::result::Result::Ok(());
22 }
23 let input = input.as_ref().unwrap();
24
25 Ok(())
26}
27pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(
28 input: &::std::option::Option<::std::string::String>,
29) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
30 if input.is_none() {
31 return ::std::result::Result::Err(
32 ::aws_smithy_types::error::operation::BuildError::missing_field(
33 "beacon_key_identifier",
34 "beacon_key_identifier is required but was not specified",
35 ),
36 );
37 }
38 if input.is_none() {
39 return ::std::result::Result::Ok(());
40 }
41 let input = input.as_ref().unwrap();
42
43 Ok(())
44}
45pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(
46 input: &::std::option::Option<
47 ::std::collections::HashMap<::std::string::String, ::std::string::String>,
48 >,
49) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
50 if input.is_none() {
51 return ::std::result::Result::Err(
52 ::aws_smithy_types::error::operation::BuildError::missing_field(
53 "encryption_context",
54 "encryption_context is required but was not specified",
55 ),
56 );
57 }
58 if input.is_none() {
59 return ::std::result::Result::Ok(());
60 }
61 let input = input.as_ref().unwrap();
62
63 validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?;
64 Ok(())
65}
66pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(
67 input: &::std::option::Option<
68 ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>,
69 >,
70) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
71 if input.is_none() {
72 return ::std::result::Result::Ok(());
73 }
74 let input = input.as_ref().unwrap();
75
76 validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input)?;
77 Ok(())
78}
79pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(
80 input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials,
81) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
82 validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(
83 &input.r#branch_key_identifier,
84 )?;
85 validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(
86 &input.r#branch_key_version,
87 )?;
88 validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(
89 &input.r#encryption_context,
90 )?;
91 validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(&input.r#branch_key)?;
92 Ok(())
93}
94pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(
95 input: &::std::option::Option<::aws_smithy_types::Blob>,
96) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
97 if input.is_none() {
98 return ::std::result::Result::Err(
99 ::aws_smithy_types::error::operation::BuildError::missing_field(
100 "branch_key",
101 "branch_key is required but was not specified",
102 ),
103 );
104 }
105 if input.is_none() {
106 return ::std::result::Result::Ok(());
107 }
108 let input = input.as_ref().unwrap();
109
110 Ok(())
111}
112pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(
113 input: &::std::option::Option<::std::string::String>,
114) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
115 if input.is_none() {
116 return ::std::result::Result::Err(
117 ::aws_smithy_types::error::operation::BuildError::missing_field(
118 "branch_key_identifier",
119 "branch_key_identifier is required but was not specified",
120 ),
121 );
122 }
123 if input.is_none() {
124 return ::std::result::Result::Ok(());
125 }
126 let input = input.as_ref().unwrap();
127
128 Ok(())
129}
130pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(
131 input: &::std::option::Option<::std::string::String>,
132) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
133 if input.is_none() {
134 return ::std::result::Result::Err(
135 ::aws_smithy_types::error::operation::BuildError::missing_field(
136 "branch_key_version",
137 "branch_key_version is required but was not specified",
138 ),
139 );
140 }
141 if input.is_none() {
142 return ::std::result::Result::Ok(());
143 }
144 let input = input.as_ref().unwrap();
145
146 Ok(())
147}
148pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(
149 input: &::std::option::Option<
150 ::std::collections::HashMap<::std::string::String, ::std::string::String>,
151 >,
152) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
153 if input.is_none() {
154 return ::std::result::Result::Err(
155 ::aws_smithy_types::error::operation::BuildError::missing_field(
156 "encryption_context",
157 "encryption_context is required but was not specified",
158 ),
159 );
160 }
161 if input.is_none() {
162 return ::std::result::Result::Ok(());
163 }
164 let input = input.as_ref().unwrap();
165
166 validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?;
167 Ok(())
168}
169pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput(
170 input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyInput,
171) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
172 validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(
173 &input.r#branch_key_identifier,
174 )?;
175 validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(
176 &input.r#encryption_context,
177 )?;
178 Ok(())
179}
180pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_for_KeyStore_CreateKey(
181 input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput,
182) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
183 validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(
184 &input.r#branch_key_identifier,
185 )?;
186 validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(
187 &input.r#encryption_context,
188 )?;
189 Ok(())
190}
191pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(
192 input: &::std::option::Option<::std::string::String>,
193) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
194 if input.is_none() {
195 return ::std::result::Result::Ok(());
196 }
197 let input = input.as_ref().unwrap();
198
199 Ok(())
200}
201pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(
202 input: &::std::option::Option<
203 ::std::collections::HashMap<::std::string::String, ::std::string::String>,
204 >,
205) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
206 if input.is_none() {
207 return ::std::result::Result::Ok(());
208 }
209 let input = input.as_ref().unwrap();
210
211 validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?;
212 Ok(())
213}
214pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput(
215 input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput,
216) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
217 validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(
218 &input.r#branch_key_identifier,
219 )?;
220 Ok(())
221}
222pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_for_KeyStore_CreateKey(
223 input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput,
224) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
225 validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(
226 &input.r#branch_key_identifier,
227 )?;
228 Ok(())
229}
230pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(
231 input: &::std::option::Option<::std::string::String>,
232) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
233 if input.is_none() {
234 return ::std::result::Result::Err(
235 ::aws_smithy_types::error::operation::BuildError::missing_field(
236 "branch_key_identifier",
237 "branch_key_identifier is required but was not specified",
238 ),
239 );
240 }
241 if input.is_none() {
242 return ::std::result::Result::Ok(());
243 }
244 let input = input.as_ref().unwrap();
245
246 Ok(())
247}
248pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput(
249 input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput,
250) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
251 Ok(())
252}
253pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput_for_KeyStore_CreateKeyStore(
254 input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreInput,
255) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
256 Ok(())
257}
258pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput(
259 input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput,
260) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
261 validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.r#table_arn)?;
262 Ok(())
263}
264pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_for_KeyStore_CreateKeyStore(
265 input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreOutput,
266) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
267 validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.r#table_arn)?;
268 Ok(())
269}
270pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(
271 input: &::std::option::Option<::std::string::String>,
272) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
273 if input.is_none() {
274 return ::std::result::Result::Err(
275 ::aws_smithy_types::error::operation::BuildError::missing_field(
276 "table_arn",
277 "table_arn is required but was not specified",
278 ),
279 );
280 }
281 if input.is_none() {
282 return ::std::result::Result::Ok(());
283 }
284 let input = input.as_ref().unwrap();
285
286 if !(1..=1024).contains(
287 &input
288 .chars()
289 .map(::std::primitive::char::len_utf16)
290 .fold(0usize, ::std::ops::Add::add),
291 ) {
292 return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
293 "table_arn",
294 "table_arn failed to satisfy constraint: Member must have length between 1 and 1024, inclusive",
295 ));
296 }
297 Ok(())
298}
299pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDdbClientReference(
300 input: &crate::deps::com_amazonaws_dynamodb::client::Client,
301) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
302 Ok(())
303}
304pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDiscovery(
305 input: &crate::deps::aws_cryptography_keyStore::types::Discovery,
306) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
307 Ok(())
308}
309pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext(
310 input: &::std::collections::HashMap<::std::string::String, ::std::string::String>,
311) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
312 for (inner_key, inner_val) in input.iter() {
313 validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(inner_key)?;
314 validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(inner_val)?;
315 }
316 Ok(())
317}
318pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(
319 input: &::std::string::String,
320) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
321 Ok(())
322}
323pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(
324 input: &::std::string::String,
325) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
326 Ok(())
327}
328pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput(
329 input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput,
330) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
331 validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(
332 &input.r#branch_key_identifier,
333 )?;
334 Ok(())
335}
336pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_for_KeyStore_GetActiveBranchKey(
337 input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput,
338) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
339 validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(
340 &input.r#branch_key_identifier,
341 )?;
342 Ok(())
343}
344pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(
345 input: &::std::option::Option<::std::string::String>,
346) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
347 if input.is_none() {
348 return ::std::result::Result::Err(
349 ::aws_smithy_types::error::operation::BuildError::missing_field(
350 "branch_key_identifier",
351 "branch_key_identifier is required but was not specified",
352 ),
353 );
354 }
355 if input.is_none() {
356 return ::std::result::Result::Ok(());
357 }
358 let input = input.as_ref().unwrap();
359
360 Ok(())
361}
362pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput(
363 input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput,
364) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
365 validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(
366 &input.r#branch_key_materials,
367 )?;
368 Ok(())
369}
370pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_for_KeyStore_GetActiveBranchKey(
371 input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput,
372) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
373 validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(
374 &input.r#branch_key_materials,
375 )?;
376 Ok(())
377}
378pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(
379 input: &::std::option::Option<
380 crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials,
381 >,
382) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
383 if input.is_none() {
384 return ::std::result::Result::Err(
385 ::aws_smithy_types::error::operation::BuildError::missing_field(
386 "branch_key_materials",
387 "branch_key_materials is required but was not specified",
388 ),
389 );
390 }
391 if input.is_none() {
392 return ::std::result::Result::Ok(());
393 }
394 let input = input.as_ref().unwrap();
395
396 validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?;
397 Ok(())
398}
399pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput(
400 input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput,
401) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
402 validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(
403 &input.r#branch_key_identifier,
404 )?;
405 Ok(())
406}
407pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_for_KeyStore_GetBeaconKey(
408 input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput,
409) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
410 validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(
411 &input.r#branch_key_identifier,
412 )?;
413 Ok(())
414}
415pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(
416 input: &::std::option::Option<::std::string::String>,
417) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
418 if input.is_none() {
419 return ::std::result::Result::Err(
420 ::aws_smithy_types::error::operation::BuildError::missing_field(
421 "branch_key_identifier",
422 "branch_key_identifier is required but was not specified",
423 ),
424 );
425 }
426 if input.is_none() {
427 return ::std::result::Result::Ok(());
428 }
429 let input = input.as_ref().unwrap();
430
431 Ok(())
432}
433pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput(
434 input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput,
435) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
436 validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(
437 &input.r#beacon_key_materials,
438 )?;
439 Ok(())
440}
441pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_for_KeyStore_GetBeaconKey(
442 input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput,
443) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
444 validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(
445 &input.r#beacon_key_materials,
446 )?;
447 Ok(())
448}
449pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(
450 input: &::std::option::Option<
451 crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials,
452 >,
453) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
454 if input.is_none() {
455 return ::std::result::Result::Err(
456 ::aws_smithy_types::error::operation::BuildError::missing_field(
457 "beacon_key_materials",
458 "beacon_key_materials is required but was not specified",
459 ),
460 );
461 }
462 if input.is_none() {
463 return ::std::result::Result::Ok(());
464 }
465 let input = input.as_ref().unwrap();
466
467 validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input)?;
468 Ok(())
469}
470pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput(
471 input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput,
472) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
473 validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(
474 &input.r#branch_key_identifier,
475 )?;
476 validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(
477 &input.r#branch_key_version,
478 )?;
479 Ok(())
480}
481pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_for_KeyStore_GetBranchKeyVersion(
482 input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput,
483) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
484 validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(
485 &input.r#branch_key_identifier,
486 )?;
487 validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(
488 &input.r#branch_key_version,
489 )?;
490 Ok(())
491}
492pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(
493 input: &::std::option::Option<::std::string::String>,
494) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
495 if input.is_none() {
496 return ::std::result::Result::Err(
497 ::aws_smithy_types::error::operation::BuildError::missing_field(
498 "branch_key_identifier",
499 "branch_key_identifier is required but was not specified",
500 ),
501 );
502 }
503 if input.is_none() {
504 return ::std::result::Result::Ok(());
505 }
506 let input = input.as_ref().unwrap();
507
508 Ok(())
509}
510pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(
511 input: &::std::option::Option<::std::string::String>,
512) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
513 if input.is_none() {
514 return ::std::result::Result::Err(
515 ::aws_smithy_types::error::operation::BuildError::missing_field(
516 "branch_key_version",
517 "branch_key_version is required but was not specified",
518 ),
519 );
520 }
521 if input.is_none() {
522 return ::std::result::Result::Ok(());
523 }
524 let input = input.as_ref().unwrap();
525
526 Ok(())
527}
528pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput(
529 input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput,
530) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
531 validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(
532 &input.r#branch_key_materials,
533 )?;
534 Ok(())
535}
536pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_for_KeyStore_GetBranchKeyVersion(
537 input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput,
538) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
539 validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(
540 &input.r#branch_key_materials,
541 )?;
542 Ok(())
543}
544pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(
545 input: &::std::option::Option<
546 crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials,
547 >,
548) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
549 if input.is_none() {
550 return ::std::result::Result::Err(
551 ::aws_smithy_types::error::operation::BuildError::missing_field(
552 "branch_key_materials",
553 "branch_key_materials is required but was not specified",
554 ),
555 );
556 }
557 if input.is_none() {
558 return ::std::result::Result::Ok(());
559 }
560 let input = input.as_ref().unwrap();
561
562 validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?;
563 Ok(())
564}
565pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput(
566 input: &crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput,
567) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
568 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.r#key_store_id)?;
569 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(
570 &input.r#key_store_name,
571 )?;
572 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(
573 &input.r#logical_key_store_name,
574 )?;
575 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(
576 &input.r#grant_tokens,
577 )?;
578 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(
579 &input.r#kms_configuration,
580 )?;
581 Ok(())
582}
583pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_for_KeyStore_GetKeyStoreInfo(
584 input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput,
585) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
586 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.r#key_store_id)?;
587 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(
588 &input.r#key_store_name,
589 )?;
590 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(
591 &input.r#logical_key_store_name,
592 )?;
593 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(
594 &input.r#grant_tokens,
595 )?;
596 validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(
597 &input.r#kms_configuration,
598 )?;
599 Ok(())
600}
601pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(
602 input: &::std::option::Option<::std::vec::Vec<::std::string::String>>,
603) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
604 if input.is_none() {
605 return ::std::result::Result::Err(
606 ::aws_smithy_types::error::operation::BuildError::missing_field(
607 "grant_tokens",
608 "grant_tokens is required but was not specified",
609 ),
610 );
611 }
612 if input.is_none() {
613 return ::std::result::Result::Ok(());
614 }
615 let input = input.as_ref().unwrap();
616
617 validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?;
618 Ok(())
619}
620pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(
621 input: &::std::option::Option<::std::string::String>,
622) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
623 if input.is_none() {
624 return ::std::result::Result::Err(
625 ::aws_smithy_types::error::operation::BuildError::missing_field(
626 "key_store_id",
627 "key_store_id is required but was not specified",
628 ),
629 );
630 }
631 if input.is_none() {
632 return ::std::result::Result::Ok(());
633 }
634 let input = input.as_ref().unwrap();
635
636 Ok(())
637}
638pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(
639 input: &::std::option::Option<::std::string::String>,
640) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
641 if input.is_none() {
642 return ::std::result::Result::Err(
643 ::aws_smithy_types::error::operation::BuildError::missing_field(
644 "key_store_name",
645 "key_store_name is required but was not specified",
646 ),
647 );
648 }
649 if input.is_none() {
650 return ::std::result::Result::Ok(());
651 }
652 let input = input.as_ref().unwrap();
653
654 if !(3..=255).contains(
655 &input
656 .chars()
657 .map(::std::primitive::char::len_utf16)
658 .fold(0usize, ::std::ops::Add::add),
659 ) {
660 return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
661 "key_store_name",
662 "key_store_name failed to satisfy constraint: Member must have length between 3 and 255, inclusive",
663 ));
664 }
665 Ok(())
666}
667pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(
668 input: &::std::option::Option<crate::deps::aws_cryptography_keyStore::types::KmsConfiguration>,
669) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
670 if input.is_none() {
671 return ::std::result::Result::Err(
672 ::aws_smithy_types::error::operation::BuildError::missing_field(
673 "kms_configuration",
674 "kms_configuration is required but was not specified",
675 ),
676 );
677 }
678 if input.is_none() {
679 return ::std::result::Result::Ok(());
680 }
681 let input = input.as_ref().unwrap();
682
683 validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?;
684 Ok(())
685}
686pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(
687 input: &::std::option::Option<::std::string::String>,
688) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
689 if input.is_none() {
690 return ::std::result::Result::Err(
691 ::aws_smithy_types::error::operation::BuildError::missing_field(
692 "logical_key_store_name",
693 "logical_key_store_name is required but was not specified",
694 ),
695 );
696 }
697 if input.is_none() {
698 return ::std::result::Result::Ok(());
699 }
700 let input = input.as_ref().unwrap();
701
702 Ok(())
703}
704pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList(
705 input: &::std::vec::Vec<::std::string::String>,
706) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
707 for inner in input.iter() {
708 validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(inner)?;
709 }
710 Ok(())
711}
712pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(
713 input: &::std::string::String,
714) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
715 Ok(())
716}
717pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(
718 input: &::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>,
719) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
720 for (inner_key, inner_val) in input.iter() {
721 validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(inner_key)?;
722 validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(inner_val)?;
723 }
724 Ok(())
725}
726pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(
727 input: &::std::string::String,
728) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
729 Ok(())
730}
731pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(
732 input: &::aws_smithy_types::Blob,
733) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
734 Ok(())
735}
736pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig(
737 input: &crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig,
738) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
739 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(&input.r#ddb_table_name)?;
740 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration(
741 &input.r#kms_configuration,
742 )?;
743 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName(
744 &input.r#logical_key_store_name,
745 )?;
746 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(&input.r#id)?;
747 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(&input.r#grant_tokens)?;
748 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(&input.r#ddb_client)?;
749 validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(&input.r#kms_client)?;
750 Ok(())
751}
752pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(
753 input: &::std::option::Option<crate::deps::com_amazonaws_dynamodb::client::Client>,
754) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
755 if input.is_none() {
756 return ::std::result::Result::Ok(());
757 }
758 let input = input.as_ref().unwrap();
759
760 validate_aws_Pcryptography_PkeyStore_HDdbClientReference(input)?;
761 Ok(())
762}
763pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(
764 input: &::std::option::Option<::std::string::String>,
765) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
766 if input.is_none() {
767 return ::std::result::Result::Err(
768 ::aws_smithy_types::error::operation::BuildError::missing_field(
769 "ddb_table_name",
770 "ddb_table_name is required but was not specified",
771 ),
772 );
773 }
774 if input.is_none() {
775 return ::std::result::Result::Ok(());
776 }
777 let input = input.as_ref().unwrap();
778
779 if !(3..=255).contains(
780 &input
781 .chars()
782 .map(::std::primitive::char::len_utf16)
783 .fold(0usize, ::std::ops::Add::add),
784 ) {
785 return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
786 "ddb_table_name",
787 "ddb_table_name failed to satisfy constraint: Member must have length between 3 and 255, inclusive",
788 ));
789 }
790 Ok(())
791}
792pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(
793 input: &::std::option::Option<::std::vec::Vec<::std::string::String>>,
794) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
795 if input.is_none() {
796 return ::std::result::Result::Ok(());
797 }
798 let input = input.as_ref().unwrap();
799
800 validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?;
801 Ok(())
802}
803pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(
804 input: &::std::option::Option<::std::string::String>,
805) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
806 if input.is_none() {
807 return ::std::result::Result::Ok(());
808 }
809 let input = input.as_ref().unwrap();
810
811 Ok(())
812}
813pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(
814 input: &::std::option::Option<crate::deps::com_amazonaws_kms::client::Client>,
815) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
816 if input.is_none() {
817 return ::std::result::Result::Ok(());
818 }
819 let input = input.as_ref().unwrap();
820
821 validate_aws_Pcryptography_PkeyStore_HKmsClientReference(input)?;
822 Ok(())
823}
824pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration(
825 input: &::std::option::Option<crate::deps::aws_cryptography_keyStore::types::KmsConfiguration>,
826) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
827 if input.is_none() {
828 return ::std::result::Result::Err(
829 ::aws_smithy_types::error::operation::BuildError::missing_field(
830 "kms_configuration",
831 "kms_configuration is required but was not specified",
832 ),
833 );
834 }
835 if input.is_none() {
836 return ::std::result::Result::Ok(());
837 }
838 let input = input.as_ref().unwrap();
839
840 validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?;
841 Ok(())
842}
843pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName(
844 input: &::std::option::Option<::std::string::String>,
845) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
846 if input.is_none() {
847 return ::std::result::Result::Err(
848 ::aws_smithy_types::error::operation::BuildError::missing_field(
849 "logical_key_store_name",
850 "logical_key_store_name is required but was not specified",
851 ),
852 );
853 }
854 if input.is_none() {
855 return ::std::result::Result::Ok(());
856 }
857 let input = input.as_ref().unwrap();
858
859 Ok(())
860}
861pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKmsClientReference(
862 input: &crate::deps::com_amazonaws_kms::client::Client,
863) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
864 Ok(())
865}
866pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(
867 input: &crate::deps::aws_cryptography_keyStore::types::KmsConfiguration,
868) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
869 if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(ref inner) =
870 &input
871 {
872 validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(inner)?;
873 }
874 if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn(ref inner) =
875 &input
876 {
877 validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(inner)?;
878 }
879 if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery(ref inner) =
880 &input
881 {
882 validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(inner)?;
883 }
884 if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(ref inner) =
885 &input
886 {
887 validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(inner)?;
888 }
889 Ok(())
890}
891pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(
892 input: &crate::deps::aws_cryptography_keyStore::types::Discovery,
893) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
894 validate_aws_Pcryptography_PkeyStore_HDiscovery(input)?;
895 Ok(())
896}
897pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(
898 input: &::std::string::String,
899) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
900 if !(1..=2048).contains(
901 &input
902 .chars()
903 .map(::std::primitive::char::len_utf16)
904 .fold(0usize, ::std::ops::Add::add),
905 ) {
906 return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
907 "kms_key_arn",
908 "kms_key_arn failed to satisfy constraint: Member must have length between 1 and 2048, inclusive",
909 ));
910 }
911 Ok(())
912}
913pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(
914 input: &::std::string::String,
915) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
916 if !(1..=2048).contains(
917 &input
918 .chars()
919 .map(::std::primitive::char::len_utf16)
920 .fold(0usize, ::std::ops::Add::add),
921 ) {
922 return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
923 "kms_mr_key_arn",
924 "kms_mr_key_arn failed to satisfy constraint: Member must have length between 1 and 2048, inclusive",
925 ));
926 }
927 Ok(())
928}
929pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(
930 input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery,
931) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
932 validate_aws_Pcryptography_PkeyStore_HMRDiscovery(input)?;
933 Ok(())
934}
935pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery(
936 input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery,
937) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
938 validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(&input.r#region)?;
939 Ok(())
940}
941pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(
942 input: &::std::option::Option<::std::string::String>,
943) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
944 if input.is_none() {
945 return ::std::result::Result::Err(
946 ::aws_smithy_types::error::operation::BuildError::missing_field(
947 "region",
948 "region is required but was not specified",
949 ),
950 );
951 }
952 if input.is_none() {
953 return ::std::result::Result::Ok(());
954 }
955 let input = input.as_ref().unwrap();
956
957 if !(1..=32).contains(
958 &input
959 .chars()
960 .map(::std::primitive::char::len_utf16)
961 .fold(0usize, ::std::ops::Add::add),
962 ) {
963 return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field(
964 "region",
965 "region failed to satisfy constraint: Member must have length between 1 and 32, inclusive",
966 ));
967 }
968 Ok(())
969}
970pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput(
971 input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyInput,
972) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
973 validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(
974 &input.r#branch_key_identifier,
975 )?;
976 Ok(())
977}
978pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_for_KeyStore_VersionKey(
979 input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput,
980) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
981 validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(
982 &input.r#branch_key_identifier,
983 )?;
984 Ok(())
985}
986pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(
987 input: &::std::option::Option<::std::string::String>,
988) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
989 if input.is_none() {
990 return ::std::result::Result::Err(
991 ::aws_smithy_types::error::operation::BuildError::missing_field(
992 "branch_key_identifier",
993 "branch_key_identifier is required but was not specified",
994 ),
995 );
996 }
997 if input.is_none() {
998 return ::std::result::Result::Ok(());
999 }
1000 let input = input.as_ref().unwrap();
1001
1002 Ok(())
1003}
1004pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput(
1005 input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput,
1006) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1007 Ok(())
1008}
1009pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput_for_KeyStore_VersionKey(
1010 input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput,
1011) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1012 Ok(())
1013}
1014pub(crate) fn validate_smithy_Papi_HUnit(
1015 input: &(),
1016) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1017 Ok(())
1018}
1019pub(crate) fn validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo(
1020 input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit,
1021) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
1022 Ok(())
1023}