aws_sdk_elasticloadbalancingv2/protocol_serde/
shape_authenticate_oidc_action_config.rs#[allow(unused_mut)]
pub fn ser_authenticate_oidc_action_config(
mut writer: ::aws_smithy_query::QueryValueWriter,
input: &crate::types::AuthenticateOidcActionConfig,
) -> Result<(), ::aws_smithy_types::error::operation::SerializationError> {
#[allow(unused_mut)]
let mut scope_1 = writer.prefix("Issuer");
if let Some(var_2) = &input.issuer {
scope_1.string(var_2);
}
#[allow(unused_mut)]
let mut scope_3 = writer.prefix("AuthorizationEndpoint");
if let Some(var_4) = &input.authorization_endpoint {
scope_3.string(var_4);
}
#[allow(unused_mut)]
let mut scope_5 = writer.prefix("TokenEndpoint");
if let Some(var_6) = &input.token_endpoint {
scope_5.string(var_6);
}
#[allow(unused_mut)]
let mut scope_7 = writer.prefix("UserInfoEndpoint");
if let Some(var_8) = &input.user_info_endpoint {
scope_7.string(var_8);
}
#[allow(unused_mut)]
let mut scope_9 = writer.prefix("ClientId");
if let Some(var_10) = &input.client_id {
scope_9.string(var_10);
}
#[allow(unused_mut)]
let mut scope_11 = writer.prefix("ClientSecret");
if let Some(var_12) = &input.client_secret {
scope_11.string(var_12);
}
#[allow(unused_mut)]
let mut scope_13 = writer.prefix("SessionCookieName");
if let Some(var_14) = &input.session_cookie_name {
scope_13.string(var_14);
}
#[allow(unused_mut)]
let mut scope_15 = writer.prefix("Scope");
if let Some(var_16) = &input.scope {
scope_15.string(var_16);
}
#[allow(unused_mut)]
let mut scope_17 = writer.prefix("SessionTimeout");
if let Some(var_18) = &input.session_timeout {
scope_17.number(
#[allow(clippy::useless_conversion)]
::aws_smithy_types::Number::NegInt((*var_18).into()),
);
}
#[allow(unused_mut)]
let mut scope_19 = writer.prefix("AuthenticationRequestExtraParams");
if let Some(var_20) = &input.authentication_request_extra_params {
let mut map_21 = scope_19.start_map(false, "key", "value");
for (key_22, value_23) in var_20 {
#[allow(unused_mut)]
let mut entry_24 = map_21.entry(key_22);
{
entry_24.string(value_23);
}
}
map_21.finish();
}
#[allow(unused_mut)]
let mut scope_25 = writer.prefix("OnUnauthenticatedRequest");
if let Some(var_26) = &input.on_unauthenticated_request {
scope_25.string(var_26.as_str());
}
#[allow(unused_mut)]
let mut scope_27 = writer.prefix("UseExistingClientSecret");
if let Some(var_28) = &input.use_existing_client_secret {
scope_27.boolean(*var_28);
}
Ok(())
}
#[allow(clippy::needless_question_mark)]
pub fn de_authenticate_oidc_action_config(
decoder: &mut ::aws_smithy_xml::decode::ScopedDecoder,
) -> Result<crate::types::AuthenticateOidcActionConfig, ::aws_smithy_xml::decode::XmlDecodeError> {
#[allow(unused_mut)]
let mut builder = crate::types::AuthenticateOidcActionConfig::builder();
while let Some(mut tag) = decoder.next_tag() {
match tag.start_el() {
s if s.matches("Issuer") => {
let var_29 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_issuer(var_29);
}
,
s if s.matches("AuthorizationEndpoint") => {
let var_30 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_authorization_endpoint(var_30);
}
,
s if s.matches("TokenEndpoint") => {
let var_31 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_token_endpoint(var_31);
}
,
s if s.matches("UserInfoEndpoint") => {
let var_32 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_user_info_endpoint(var_32);
}
,
s if s.matches("ClientId") => {
let var_33 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_client_id(var_33);
}
,
s if s.matches("ClientSecret") => {
let var_34 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_client_secret(var_34);
}
,
s if s.matches("SessionCookieName") => {
let var_35 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_session_cookie_name(var_35);
}
,
s if s.matches("Scope") => {
let var_36 =
Some(
Result::<::std::string::String, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
.into()
)
?
)
;
builder = builder.set_scope(var_36);
}
,
s if s.matches("SessionTimeout") => {
let var_37 =
Some(
{
<i64 as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
)
.map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (long: `com.amazonaws.elasticloadbalancingv2#AuthenticateOidcActionSessionTimeout`)"))
}
?
)
;
builder = builder.set_session_timeout(var_37);
}
,
s if s.matches("AuthenticationRequestExtraParams") => {
let var_38 =
Some(
crate::protocol_serde::shape_authenticate_oidc_action_authentication_request_extra_params::de_authenticate_oidc_action_authentication_request_extra_params(&mut tag)
?
)
;
builder = builder.set_authentication_request_extra_params(var_38);
}
,
s if s.matches("OnUnauthenticatedRequest") => {
let var_39 =
Some(
Result::<crate::types::AuthenticateOidcActionConditionalBehaviorEnum, ::aws_smithy_xml::decode::XmlDecodeError>::Ok(
crate::types::AuthenticateOidcActionConditionalBehaviorEnum::from(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
)
)
?
)
;
builder = builder.set_on_unauthenticated_request(var_39);
}
,
s if s.matches("UseExistingClientSecret") => {
let var_40 =
Some(
{
<bool as ::aws_smithy_types::primitive::Parse>::parse_smithy_primitive(
::aws_smithy_xml::decode::try_data(&mut tag)?.as_ref()
)
.map_err(|_|::aws_smithy_xml::decode::XmlDecodeError::custom("expected (boolean: `com.amazonaws.elasticloadbalancingv2#AuthenticateOidcActionUseExistingClientSecret`)"))
}
?
)
;
builder = builder.set_use_existing_client_secret(var_40);
}
,
_ => {}
}
}
Ok(crate::serde_util::authenticate_oidc_action_config_correct_errors(builder).build())
}