// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
/// Orchestration and serialization glue logic for `VerifyMac`.
#[derive(::std::clone::Clone, ::std::default::Default, ::std::fmt::Debug)]
#[non_exhaustive]
pub struct VerifyMac;
impl VerifyMac {
/// Creates a new `VerifyMac`
pub fn new() -> Self {
Self
}
pub(crate) async fn orchestrate(
runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
input: crate::operation::verify_mac::VerifyMacInput,
) -> ::std::result::Result<
crate::operation::verify_mac::VerifyMacOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::verify_mac::VerifyMacError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let map_err = |err: ::aws_smithy_runtime_api::client::result::SdkError<
::aws_smithy_runtime_api::client::interceptors::context::Error,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>| {
err.map_service_error(|err| {
err.downcast::<crate::operation::verify_mac::VerifyMacError>()
.expect("correct error type")
})
};
let context = Self::orchestrate_with_stop_point(runtime_plugins, input, ::aws_smithy_runtime::client::orchestrator::StopPoint::None)
.await
.map_err(map_err)?;
let output = context.finalize().map_err(map_err)?;
::std::result::Result::Ok(
output
.downcast::<crate::operation::verify_mac::VerifyMacOutput>()
.expect("correct output type"),
)
}
pub(crate) async fn orchestrate_with_stop_point(
runtime_plugins: &::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
input: crate::operation::verify_mac::VerifyMacInput,
stop_point: ::aws_smithy_runtime::client::orchestrator::StopPoint,
) -> ::std::result::Result<
::aws_smithy_runtime_api::client::interceptors::context::InterceptorContext,
::aws_smithy_runtime_api::client::result::SdkError<
::aws_smithy_runtime_api::client::interceptors::context::Error,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let input = ::aws_smithy_runtime_api::client::interceptors::context::Input::erase(input);
use ::tracing::Instrument;
::aws_smithy_runtime::client::orchestrator::invoke_with_stop_point("KMS", "VerifyMac", input, runtime_plugins, stop_point)
// Create a parent span for the entire operation. Includes a random, internal-only,
// seven-digit ID for the operation orchestration so that it can be correlated in the logs.
.instrument(::tracing::debug_span!(
"KMS.VerifyMac",
"rpc.service" = "KMS",
"rpc.method" = "VerifyMac",
"sdk_invocation_id" = ::fastrand::u32(1_000_000..10_000_000),
"rpc.system" = "aws-api",
))
.await
}
pub(crate) fn operation_runtime_plugins(
client_runtime_plugins: ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins,
client_config: &crate::config::Config,
config_override: ::std::option::Option<crate::config::Builder>,
) -> ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugins {
let mut runtime_plugins = client_runtime_plugins.with_operation_plugin(Self::new());
if let ::std::option::Option::Some(config_override) = config_override {
for plugin in config_override.runtime_plugins.iter().cloned() {
runtime_plugins = runtime_plugins.with_operation_plugin(plugin);
}
runtime_plugins = runtime_plugins.with_operation_plugin(crate::config::ConfigOverrideRuntimePlugin::new(
config_override,
client_config.config.clone(),
&client_config.runtime_components,
));
}
runtime_plugins
}
}
impl ::aws_smithy_runtime_api::client::runtime_plugin::RuntimePlugin for VerifyMac {
fn config(&self) -> ::std::option::Option<::aws_smithy_types::config_bag::FrozenLayer> {
let mut cfg = ::aws_smithy_types::config_bag::Layer::new("VerifyMac");
cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedRequestSerializer::new(
VerifyMacRequestSerializer,
));
cfg.store_put(::aws_smithy_runtime_api::client::ser_de::SharedResponseDeserializer::new(
VerifyMacResponseDeserializer,
));
cfg.store_put(::aws_smithy_runtime_api::client::auth::AuthSchemeOptionResolverParams::new(
crate::config::auth::Params::builder()
.operation_name("VerifyMac")
.build()
.expect("required fields set"),
));
cfg.store_put(::aws_smithy_runtime_api::client::orchestrator::Metadata::new("VerifyMac", "KMS"));
let mut signing_options = ::aws_runtime::auth::SigningOptions::default();
signing_options.double_uri_encode = true;
signing_options.content_sha256_header = false;
signing_options.normalize_uri_path = true;
signing_options.payload_override = None;
cfg.store_put(::aws_runtime::auth::SigV4OperationSigningConfig {
signing_options,
..::std::default::Default::default()
});
::std::option::Option::Some(cfg.freeze())
}
fn runtime_components(
&self,
_: &::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder,
) -> ::std::borrow::Cow<'_, ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder> {
#[allow(unused_mut)]
let mut rcb = ::aws_smithy_runtime_api::client::runtime_components::RuntimeComponentsBuilder::new("VerifyMac")
.with_interceptor(::aws_smithy_runtime_api::client::interceptors::SharedInterceptor::permanent(
::aws_smithy_runtime::client::stalled_stream_protection::StalledStreamProtectionInterceptor::default(),
))
.with_interceptor(::aws_smithy_runtime_api::client::interceptors::SharedInterceptor::permanent(
VerifyMacEndpointParamsInterceptor,
))
.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::TransientErrorClassifier::<
crate::operation::verify_mac::VerifyMacError,
>::new())
.with_retry_classifier(::aws_smithy_runtime::client::retries::classifiers::ModeledAsRetryableClassifier::<
crate::operation::verify_mac::VerifyMacError,
>::new())
.with_retry_classifier(::aws_runtime::retries::classifiers::AwsErrorCodeClassifier::<
crate::operation::verify_mac::VerifyMacError,
>::new());
::std::borrow::Cow::Owned(rcb)
}
}
#[derive(Debug)]
struct VerifyMacResponseDeserializer;
impl ::aws_smithy_runtime_api::client::ser_de::DeserializeResponse for VerifyMacResponseDeserializer {
fn deserialize_nonstreaming(
&self,
response: &::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
) -> ::aws_smithy_runtime_api::client::interceptors::context::OutputOrError {
let (success, status) = (response.status().is_success(), response.status().as_u16());
let headers = response.headers();
let body = response.body().bytes().expect("body loaded");
#[allow(unused_mut)]
let mut force_error = false;
::tracing::debug!(request_id = ?::aws_types::request_id::RequestId::request_id(response));
let parse_result = if !success && status != 200 || force_error {
crate::protocol_serde::shape_verify_mac::de_verify_mac_http_error(status, headers, body)
} else {
crate::protocol_serde::shape_verify_mac::de_verify_mac_http_response(status, headers, body)
};
crate::protocol_serde::type_erase_result(parse_result)
}
}
#[derive(Debug)]
struct VerifyMacRequestSerializer;
impl ::aws_smithy_runtime_api::client::ser_de::SerializeRequest for VerifyMacRequestSerializer {
#[allow(unused_mut, clippy::let_and_return, clippy::needless_borrow, clippy::useless_conversion)]
fn serialize_input(
&self,
input: ::aws_smithy_runtime_api::client::interceptors::context::Input,
_cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
) -> ::std::result::Result<::aws_smithy_runtime_api::client::orchestrator::HttpRequest, ::aws_smithy_runtime_api::box_error::BoxError> {
let input = input.downcast::<crate::operation::verify_mac::VerifyMacInput>().expect("correct type");
let _header_serialization_settings = _cfg
.load::<crate::serialization_settings::HeaderSerializationSettings>()
.cloned()
.unwrap_or_default();
let mut request_builder = {
#[allow(clippy::uninlined_format_args)]
fn uri_base(
_input: &crate::operation::verify_mac::VerifyMacInput,
output: &mut ::std::string::String,
) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> {
use ::std::fmt::Write as _;
::std::write!(output, "/").expect("formatting should succeed");
::std::result::Result::Ok(())
}
#[allow(clippy::unnecessary_wraps)]
fn update_http_builder(
input: &crate::operation::verify_mac::VerifyMacInput,
builder: ::http_1x::request::Builder,
) -> ::std::result::Result<::http_1x::request::Builder, ::aws_smithy_types::error::operation::BuildError> {
let mut uri = ::std::string::String::new();
uri_base(input, &mut uri)?;
::std::result::Result::Ok(builder.method("POST").uri(uri))
}
let mut builder = update_http_builder(&input, ::http_1x::request::Builder::new())?;
builder = _header_serialization_settings.set_default_header(builder, ::http_1x::header::CONTENT_TYPE, "application/x-amz-json-1.1");
builder = _header_serialization_settings.set_default_header(
builder,
::http_1x::header::HeaderName::from_static("x-amz-target"),
"TrentService.VerifyMac",
);
builder
};
let body = ::aws_smithy_types::body::SdkBody::from(crate::protocol_serde::shape_verify_mac::ser_verify_mac_input(&input)?);
if let Some(content_length) = body.content_length() {
let content_length = content_length.to_string();
request_builder = _header_serialization_settings.set_default_header(request_builder, ::http_1x::header::CONTENT_LENGTH, &content_length);
}
::std::result::Result::Ok(request_builder.body(body).expect("valid request").try_into().unwrap())
}
}
#[derive(Debug)]
struct VerifyMacEndpointParamsInterceptor;
#[::aws_smithy_runtime_api::client::interceptors::dyn_dispatch_hint]
impl ::aws_smithy_runtime_api::client::interceptors::Intercept for VerifyMacEndpointParamsInterceptor {
fn name(&self) -> &'static str {
"VerifyMacEndpointParamsInterceptor"
}
fn read_before_execution(
&self,
context: &::aws_smithy_runtime_api::client::interceptors::context::BeforeSerializationInterceptorContextRef<
'_,
::aws_smithy_runtime_api::client::interceptors::context::Input,
::aws_smithy_runtime_api::client::interceptors::context::Output,
::aws_smithy_runtime_api::client::interceptors::context::Error,
>,
cfg: &mut ::aws_smithy_types::config_bag::ConfigBag,
) -> ::std::result::Result<(), ::aws_smithy_runtime_api::box_error::BoxError> {
let _input = context
.input()
.downcast_ref::<VerifyMacInput>()
.ok_or("failed to downcast to VerifyMacInput")?;
let params = crate::config::endpoint::Params::builder()
.set_region(cfg.load::<::aws_types::region::Region>().map(|r| r.as_ref().to_owned()))
.set_use_dual_stack(cfg.load::<::aws_types::endpoint_config::UseDualStack>().map(|ty| ty.0))
.set_use_fips(cfg.load::<::aws_types::endpoint_config::UseFips>().map(|ty| ty.0))
.set_endpoint(cfg.load::<::aws_types::endpoint_config::EndpointUrl>().map(|ty| ty.0.clone()))
.build()
.map_err(|err| {
::aws_smithy_runtime_api::client::interceptors::error::ContextAttachedError::new("endpoint params could not be built", err)
})?;
cfg.interceptor_state()
.store_put(::aws_smithy_runtime_api::client::endpoint::EndpointResolverParams::new(params));
::std::result::Result::Ok(())
}
}
// The get_* functions below are generated from JMESPath expressions in the
// operationContextParams trait. They target the operation's input shape.
/// Error type for the `VerifyMacError` operation.
#[non_exhaustive]
#[derive(::std::fmt::Debug)]
pub enum VerifyMacError {
/// <p>The request was rejected because the specified KMS key is not enabled.</p>
DisabledException(crate::types::error::DisabledException),
/// <p>The request was rejected because the DryRun parameter was specified.</p>
DryRunOperationException(crate::types::error::DryRunOperationException),
/// <p>The request was rejected because the specified grant token is not valid.</p>
InvalidGrantTokenException(crate::types::error::InvalidGrantTokenException),
/// <p>The request was rejected for one of the following reasons:</p>
/// <ul>
/// <li>
/// <p>The <code>KeyUsage</code> value of the KMS key is incompatible with the API operation.</p></li>
/// <li>
/// <p>The encryption algorithm or signing algorithm specified for the operation is incompatible with the type of key material in the KMS key <code>(KeySpec</code>).</p></li>
/// </ul>
/// <p>For encrypting, decrypting, re-encrypting, and generating data keys, the <code>KeyUsage</code> must be <code>ENCRYPT_DECRYPT</code>. For signing and verifying messages, the <code>KeyUsage</code> must be <code>SIGN_VERIFY</code>. For generating and verifying message authentication codes (MACs), the <code>KeyUsage</code> must be <code>GENERATE_VERIFY_MAC</code>. For deriving key agreement secrets, the <code>KeyUsage</code> must be <code>KEY_AGREEMENT</code>. To find the <code>KeyUsage</code> of a KMS key, use the <code>DescribeKey</code> operation.</p>
/// <p>To find the encryption or signing algorithms supported for a particular KMS key, use the <code>DescribeKey</code> operation.</p>
InvalidKeyUsageException(crate::types::error::InvalidKeyUsageException),
/// <p>The request was rejected because the specified KMS key was not available. You can retry the request.</p>
KeyUnavailableException(crate::types::error::KeyUnavailableException),
/// <p>The request was rejected because an internal exception occurred. The request can be retried.</p>
KmsInternalException(crate::types::error::KmsInternalException),
/// <p>The request was rejected because the HMAC verification failed. HMAC verification fails when the HMAC computed by using the specified message, HMAC KMS key, and MAC algorithm does not match the HMAC specified in the request.</p>
KmsInvalidMacException(crate::types::error::KmsInvalidMacException),
/// <p>The request was rejected because the state of the specified resource is not valid for this request.</p>
/// <p>This exceptions means one of the following:</p>
/// <ul>
/// <li>
/// <p>The key state of the KMS key is not compatible with the operation.</p>
/// <p>To find the key state, use the <code>DescribeKey</code> operation. For more information about which key states are compatible with each KMS operation, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i> <i>Key Management Service Developer Guide</i> </i>.</p></li>
/// <li>
/// <p>For cryptographic operations on KMS keys in custom key stores, this exception represents a general failure with many possible causes. To identify the cause, see the error message that accompanies the exception.</p></li>
/// </ul>
KmsInvalidStateException(crate::types::error::KmsInvalidStateException),
/// <p>The request was rejected because the specified entity or resource could not be found.</p>
NotFoundException(crate::types::error::NotFoundException),
/// An unexpected error occurred (e.g., invalid JSON returned by the service or an unknown error code).
#[deprecated(note = "Matching `Unhandled` directly is not forwards compatible. Instead, match using a \
variable wildcard pattern and check `.code()`:
\
`err if err.code() == Some(\"SpecificExceptionCode\") => { /* handle the error */ }`
\
See [`ProvideErrorMetadata`](#impl-ProvideErrorMetadata-for-VerifyMacError) for what information is available for the error.")]
Unhandled(crate::error::sealed_unhandled::Unhandled),
}
impl VerifyMacError {
/// Creates the `VerifyMacError::Unhandled` variant from any error type.
pub fn unhandled(
err: impl ::std::convert::Into<::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>>,
) -> Self {
Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
source: err.into(),
meta: ::std::default::Default::default(),
})
}
/// Creates the `VerifyMacError::Unhandled` variant from an [`ErrorMetadata`](::aws_smithy_types::error::ErrorMetadata).
pub fn generic(err: ::aws_smithy_types::error::ErrorMetadata) -> Self {
Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
source: err.clone().into(),
meta: err,
})
}
///
/// Returns error metadata, which includes the error code, message,
/// request ID, and potentially additional information.
///
pub fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
match self {
Self::DisabledException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::DryRunOperationException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::InvalidGrantTokenException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::InvalidKeyUsageException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::KeyUnavailableException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::KmsInternalException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::KmsInvalidMacException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::KmsInvalidStateException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::NotFoundException(e) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(e),
Self::Unhandled(e) => &e.meta,
}
}
/// Returns `true` if the error kind is `VerifyMacError::DisabledException`.
pub fn is_disabled_exception(&self) -> bool {
matches!(self, Self::DisabledException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::DryRunOperationException`.
pub fn is_dry_run_operation_exception(&self) -> bool {
matches!(self, Self::DryRunOperationException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::InvalidGrantTokenException`.
pub fn is_invalid_grant_token_exception(&self) -> bool {
matches!(self, Self::InvalidGrantTokenException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::InvalidKeyUsageException`.
pub fn is_invalid_key_usage_exception(&self) -> bool {
matches!(self, Self::InvalidKeyUsageException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::KeyUnavailableException`.
pub fn is_key_unavailable_exception(&self) -> bool {
matches!(self, Self::KeyUnavailableException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::KmsInternalException`.
pub fn is_kms_internal_exception(&self) -> bool {
matches!(self, Self::KmsInternalException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::KmsInvalidMacException`.
pub fn is_kms_invalid_mac_exception(&self) -> bool {
matches!(self, Self::KmsInvalidMacException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::KmsInvalidStateException`.
pub fn is_kms_invalid_state_exception(&self) -> bool {
matches!(self, Self::KmsInvalidStateException(_))
}
/// Returns `true` if the error kind is `VerifyMacError::NotFoundException`.
pub fn is_not_found_exception(&self) -> bool {
matches!(self, Self::NotFoundException(_))
}
}
impl ::std::error::Error for VerifyMacError {
fn source(&self) -> ::std::option::Option<&(dyn ::std::error::Error + 'static)> {
match self {
Self::DisabledException(_inner) => ::std::option::Option::Some(_inner),
Self::DryRunOperationException(_inner) => ::std::option::Option::Some(_inner),
Self::InvalidGrantTokenException(_inner) => ::std::option::Option::Some(_inner),
Self::InvalidKeyUsageException(_inner) => ::std::option::Option::Some(_inner),
Self::KeyUnavailableException(_inner) => ::std::option::Option::Some(_inner),
Self::KmsInternalException(_inner) => ::std::option::Option::Some(_inner),
Self::KmsInvalidMacException(_inner) => ::std::option::Option::Some(_inner),
Self::KmsInvalidStateException(_inner) => ::std::option::Option::Some(_inner),
Self::NotFoundException(_inner) => ::std::option::Option::Some(_inner),
Self::Unhandled(_inner) => ::std::option::Option::Some(&*_inner.source),
}
}
}
impl ::std::fmt::Display for VerifyMacError {
fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
match self {
Self::DisabledException(_inner) => _inner.fmt(f),
Self::DryRunOperationException(_inner) => _inner.fmt(f),
Self::InvalidGrantTokenException(_inner) => _inner.fmt(f),
Self::InvalidKeyUsageException(_inner) => _inner.fmt(f),
Self::KeyUnavailableException(_inner) => _inner.fmt(f),
Self::KmsInternalException(_inner) => _inner.fmt(f),
Self::KmsInvalidMacException(_inner) => _inner.fmt(f),
Self::KmsInvalidStateException(_inner) => _inner.fmt(f),
Self::NotFoundException(_inner) => _inner.fmt(f),
Self::Unhandled(_inner) => {
if let ::std::option::Option::Some(code) = ::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self) {
write!(f, "unhandled error ({code})")
} else {
f.write_str("unhandled error")
}
}
}
}
}
impl ::aws_smithy_types::retry::ProvideErrorKind for VerifyMacError {
fn code(&self) -> ::std::option::Option<&str> {
::aws_smithy_types::error::metadata::ProvideErrorMetadata::code(self)
}
fn retryable_error_kind(&self) -> ::std::option::Option<::aws_smithy_types::retry::ErrorKind> {
::std::option::Option::None
}
}
impl ::aws_smithy_types::error::metadata::ProvideErrorMetadata for VerifyMacError {
fn meta(&self) -> &::aws_smithy_types::error::ErrorMetadata {
match self {
Self::DisabledException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::DryRunOperationException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::InvalidGrantTokenException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::InvalidKeyUsageException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::KeyUnavailableException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::KmsInternalException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::KmsInvalidMacException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::KmsInvalidStateException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::NotFoundException(_inner) => ::aws_smithy_types::error::metadata::ProvideErrorMetadata::meta(_inner),
Self::Unhandled(_inner) => &_inner.meta,
}
}
}
impl ::aws_smithy_runtime_api::client::result::CreateUnhandledError for VerifyMacError {
fn create_unhandled_error(
source: ::std::boxed::Box<dyn ::std::error::Error + ::std::marker::Send + ::std::marker::Sync + 'static>,
meta: ::std::option::Option<::aws_smithy_types::error::ErrorMetadata>,
) -> Self {
Self::Unhandled(crate::error::sealed_unhandled::Unhandled {
source,
meta: meta.unwrap_or_default(),
})
}
}
impl ::aws_types::request_id::RequestId for crate::operation::verify_mac::VerifyMacError {
fn request_id(&self) -> Option<&str> {
self.meta().request_id()
}
}
pub use crate::operation::verify_mac::_verify_mac_input::VerifyMacInput;
pub use crate::operation::verify_mac::_verify_mac_output::VerifyMacOutput;
mod _verify_mac_input;
mod _verify_mac_output;
/// Builders
pub mod builders;