aws_sdk_ec2/protocol_serde/
shape_create_verified_access_instance_input.rs1pub fn ser_create_verified_access_instance_input_input_input(
3 input: &crate::operation::create_verified_access_instance::CreateVerifiedAccessInstanceInput,
4) -> ::std::result::Result<::aws_smithy_types::body::SdkBody, ::aws_smithy_types::error::operation::SerializationError> {
5 let mut out = String::new();
6 #[allow(unused_mut)]
7 let mut writer = ::aws_smithy_query::QueryWriter::new(&mut out, "CreateVerifiedAccessInstance", "2016-11-15");
8 #[allow(unused_mut)]
9 let mut scope_1 = writer.prefix("Description");
10 if let Some(var_2) = &input.description {
11 scope_1.string(var_2);
12 }
13 #[allow(unused_mut)]
14 let mut scope_3 = writer.prefix("TagSpecification");
15 if let Some(var_4) = &input.tag_specifications {
16 if !var_4.is_empty() {
17 let mut list_6 = scope_3.start_list(true, Some("item"));
18 for item_5 in var_4 {
19 #[allow(unused_mut)]
20 let mut entry_7 = list_6.entry();
21 crate::protocol_serde::shape_tag_specification::ser_tag_specification(entry_7, item_5)?;
22 }
23 list_6.finish();
24 }
25 }
26 #[allow(unused_mut)]
27 let mut scope_8 = writer.prefix("ClientToken");
28 if let Some(var_9) = &input.client_token {
29 scope_8.string(var_9);
30 }
31 #[allow(unused_mut)]
32 let mut scope_10 = writer.prefix("DryRun");
33 if let Some(var_11) = &input.dry_run {
34 scope_10.boolean(*var_11);
35 }
36 #[allow(unused_mut)]
37 let mut scope_12 = writer.prefix("FIPSEnabled");
38 if let Some(var_13) = &input.fips_enabled {
39 scope_12.boolean(*var_13);
40 }
41 #[allow(unused_mut)]
42 let mut scope_14 = writer.prefix("CidrEndpointsCustomSubDomain");
43 if let Some(var_15) = &input.cidr_endpoints_custom_sub_domain {
44 scope_14.string(var_15);
45 }
46 writer.finish();
47 Ok(::aws_smithy_types::body::SdkBody::from(out))
48}