pub fn ser_create_security_profile_input_input(
object: &mut ::aws_smithy_json::serialize::JsonObjectWriter,
input: &crate::operation::create_security_profile::CreateSecurityProfileInput,
) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::SerializationError> {
if let Some(var_1) = &input.allowed_access_control_hierarchy_group_id {
object.key("AllowedAccessControlHierarchyGroupId").string(var_1.as_str());
}
if let Some(var_2) = &input.allowed_access_control_tags {
#[allow(unused_mut)]
let mut object_3 = object.key("AllowedAccessControlTags").start_object();
for (key_4, value_5) in var_2 {
{
object_3.key(key_4.as_str()).string(value_5.as_str());
}
}
object_3.finish();
}
if let Some(var_6) = &input.allowed_flow_modules {
let mut array_7 = object.key("AllowedFlowModules").start_array();
for item_8 in var_6 {
{
#[allow(unused_mut)]
let mut object_9 = array_7.value().start_object();
crate::protocol_serde::shape_flow_module::ser_flow_module(&mut object_9, item_8)?;
object_9.finish();
}
}
array_7.finish();
}
if let Some(var_10) = &input.applications {
let mut array_11 = object.key("Applications").start_array();
for item_12 in var_10 {
{
#[allow(unused_mut)]
let mut object_13 = array_11.value().start_object();
crate::protocol_serde::shape_application::ser_application(&mut object_13, item_12)?;
object_13.finish();
}
}
array_11.finish();
}
if let Some(var_14) = &input.description {
object.key("Description").string(var_14.as_str());
}
if let Some(var_15) = &input.granular_access_control_configuration {
#[allow(unused_mut)]
let mut object_16 = object.key("GranularAccessControlConfiguration").start_object();
crate::protocol_serde::shape_granular_access_control_configuration::ser_granular_access_control_configuration(&mut object_16, var_15)?;
object_16.finish();
}
if let Some(var_17) = &input.hierarchy_restricted_resources {
let mut array_18 = object.key("HierarchyRestrictedResources").start_array();
for item_19 in var_17 {
{
array_18.value().string(item_19.as_str());
}
}
array_18.finish();
}
if let Some(var_20) = &input.permissions {
let mut array_21 = object.key("Permissions").start_array();
for item_22 in var_20 {
{
array_21.value().string(item_22.as_str());
}
}
array_21.finish();
}
if let Some(var_23) = &input.security_profile_name {
object.key("SecurityProfileName").string(var_23.as_str());
}
if let Some(var_24) = &input.tag_restricted_resources {
let mut array_25 = object.key("TagRestrictedResources").start_array();
for item_26 in var_24 {
{
array_25.value().string(item_26.as_str());
}
}
array_25.finish();
}
if let Some(var_27) = &input.tags {
#[allow(unused_mut)]
let mut object_28 = object.key("Tags").start_object();
for (key_29, value_30) in var_27 {
{
object_28.key(key_29.as_str()).string(value_30.as_str());
}
}
object_28.finish();
}
Ok(())
}