pub(crate) fn de_package_vulnerability_details<'a, I>(
tokens: &mut ::std::iter::Peekable<I>,
_value: &'a [u8],
) -> ::std::result::Result<Option<crate::types::PackageVulnerabilityDetails>, ::aws_smithy_json::deserialize::error::DeserializeError>
where
I: Iterator<Item = Result<::aws_smithy_json::deserialize::Token<'a>, ::aws_smithy_json::deserialize::error::DeserializeError>>,
{
match tokens.next().transpose()? {
Some(::aws_smithy_json::deserialize::Token::ValueNull { .. }) => Ok(None),
Some(::aws_smithy_json::deserialize::Token::StartObject { .. }) => {
#[allow(unused_mut)]
let mut builder = crate::types::builders::PackageVulnerabilityDetailsBuilder::default();
loop {
match tokens.next().transpose()? {
Some(::aws_smithy_json::deserialize::Token::EndObject { .. }) => break,
Some(::aws_smithy_json::deserialize::Token::ObjectKey { key, .. }) => match key.to_unescaped()?.as_ref() {
"vulnerabilityId" => {
builder = builder.set_vulnerability_id(
::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
.map(|s| s.to_unescaped().map(|u| u.into_owned()))
.transpose()?,
);
}
"vulnerablePackages" => {
builder = builder.set_vulnerable_packages(
crate::protocol_serde::shape_vulnerable_package_list::de_vulnerable_package_list(tokens, _value)?,
);
}
"source" => {
builder = builder.set_source(
::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
.map(|s| s.to_unescaped().map(|u| u.into_owned()))
.transpose()?,
);
}
"cvss" => {
builder = builder.set_cvss(crate::protocol_serde::shape_cvss_score_list::de_cvss_score_list(tokens, _value)?);
}
"relatedVulnerabilities" => {
builder = builder.set_related_vulnerabilities(
crate::protocol_serde::shape_vulnerability_id_list::de_vulnerability_id_list(tokens, _value)?,
);
}
"sourceUrl" => {
builder = builder.set_source_url(
::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
.map(|s| s.to_unescaped().map(|u| u.into_owned()))
.transpose()?,
);
}
"vendorSeverity" => {
builder = builder.set_vendor_severity(
::aws_smithy_json::deserialize::token::expect_string_or_null(tokens.next())?
.map(|s| s.to_unescaped().map(|u| u.into_owned()))
.transpose()?,
);
}
"vendorCreatedAt" => {
builder = builder.set_vendor_created_at(::aws_smithy_json::deserialize::token::expect_timestamp_or_null(
tokens.next(),
::aws_smithy_types::date_time::Format::EpochSeconds,
)?);
}
"vendorUpdatedAt" => {
builder = builder.set_vendor_updated_at(::aws_smithy_json::deserialize::token::expect_timestamp_or_null(
tokens.next(),
::aws_smithy_types::date_time::Format::EpochSeconds,
)?);
}
"referenceUrls" => {
builder = builder.set_reference_urls(crate::protocol_serde::shape_non_empty_string_list::de_non_empty_string_list(
tokens, _value,
)?);
}
_ => ::aws_smithy_json::deserialize::token::skip_value(tokens)?,
},
other => {
return Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(format!(
"expected object key or end object, found: {other:?}"
)))
}
}
}
Ok(Some(
crate::serde_util::package_vulnerability_details_correct_errors(builder)
.build()
.map_err(|err| ::aws_smithy_json::deserialize::error::DeserializeError::custom_source("Response was invalid", err))?,
))
}
_ => Err(::aws_smithy_json::deserialize::error::DeserializeError::custom(
"expected start object or null",
)),
}
}