aws_sdk_securityhub/types/
_threat_intel_indicator_category.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2
3/// When writing a match expression against `ThreatIntelIndicatorCategory`, it is important to ensure
4/// your code is forward-compatible. That is, if a match arm handles a case for a
5/// feature that is supported by the service but has not been represented as an enum
6/// variant in a current version of SDK, your code should continue to work when you
7/// upgrade SDK to a future version in which the enum does include a variant for that
8/// feature.
9///
10/// Here is an example of how you can make a match expression forward-compatible:
11///
12/// ```text
13/// # let threatintelindicatorcategory = unimplemented!();
14/// match threatintelindicatorcategory {
15///     ThreatIntelIndicatorCategory::Backdoor => { /* ... */ },
16///     ThreatIntelIndicatorCategory::CardStealer => { /* ... */ },
17///     ThreatIntelIndicatorCategory::CommandAndControl => { /* ... */ },
18///     ThreatIntelIndicatorCategory::DropSite => { /* ... */ },
19///     ThreatIntelIndicatorCategory::ExploitSite => { /* ... */ },
20///     ThreatIntelIndicatorCategory::Keylogger => { /* ... */ },
21///     other @ _ if other.as_str() == "NewFeature" => { /* handles a case for `NewFeature` */ },
22///     _ => { /* ... */ },
23/// }
24/// ```
25/// The above code demonstrates that when `threatintelindicatorcategory` represents
26/// `NewFeature`, the execution path will lead to the second last match arm,
27/// even though the enum does not contain a variant `ThreatIntelIndicatorCategory::NewFeature`
28/// in the current version of SDK. The reason is that the variable `other`,
29/// created by the `@` operator, is bound to
30/// `ThreatIntelIndicatorCategory::Unknown(UnknownVariantValue("NewFeature".to_owned()))`
31/// and calling `as_str` on it yields `"NewFeature"`.
32/// This match expression is forward-compatible when executed with a newer
33/// version of SDK where the variant `ThreatIntelIndicatorCategory::NewFeature` is defined.
34/// Specifically, when `threatintelindicatorcategory` represents `NewFeature`,
35/// the execution path will hit the second last match arm as before by virtue of
36/// calling `as_str` on `ThreatIntelIndicatorCategory::NewFeature` also yielding `"NewFeature"`.
37///
38/// Explicitly matching on the `Unknown` variant should
39/// be avoided for two reasons:
40/// - The inner data `UnknownVariantValue` is opaque, and no further information can be extracted.
41/// - It might inadvertently shadow other intended match arms.
42///
43#[allow(missing_docs)] // documentation missing in model
44#[non_exhaustive]
45#[derive(
46    ::std::clone::Clone, ::std::cmp::Eq, ::std::cmp::Ord, ::std::cmp::PartialEq, ::std::cmp::PartialOrd, ::std::fmt::Debug, ::std::hash::Hash,
47)]
48pub enum ThreatIntelIndicatorCategory {
49    #[allow(missing_docs)] // documentation missing in model
50    Backdoor,
51    #[allow(missing_docs)] // documentation missing in model
52    CardStealer,
53    #[allow(missing_docs)] // documentation missing in model
54    CommandAndControl,
55    #[allow(missing_docs)] // documentation missing in model
56    DropSite,
57    #[allow(missing_docs)] // documentation missing in model
58    ExploitSite,
59    #[allow(missing_docs)] // documentation missing in model
60    Keylogger,
61    /// `Unknown` contains new variants that have been added since this code was generated.
62    #[deprecated(note = "Don't directly match on `Unknown`. See the docs on this enum for the correct way to handle unknown variants.")]
63    Unknown(crate::primitives::sealed_enum_unknown::UnknownVariantValue),
64}
65impl ::std::convert::From<&str> for ThreatIntelIndicatorCategory {
66    fn from(s: &str) -> Self {
67        match s {
68            "BACKDOOR" => ThreatIntelIndicatorCategory::Backdoor,
69            "CARD_STEALER" => ThreatIntelIndicatorCategory::CardStealer,
70            "COMMAND_AND_CONTROL" => ThreatIntelIndicatorCategory::CommandAndControl,
71            "DROP_SITE" => ThreatIntelIndicatorCategory::DropSite,
72            "EXPLOIT_SITE" => ThreatIntelIndicatorCategory::ExploitSite,
73            "KEYLOGGER" => ThreatIntelIndicatorCategory::Keylogger,
74            other => ThreatIntelIndicatorCategory::Unknown(crate::primitives::sealed_enum_unknown::UnknownVariantValue(other.to_owned())),
75        }
76    }
77}
78impl ::std::str::FromStr for ThreatIntelIndicatorCategory {
79    type Err = ::std::convert::Infallible;
80
81    fn from_str(s: &str) -> ::std::result::Result<Self, <Self as ::std::str::FromStr>::Err> {
82        ::std::result::Result::Ok(ThreatIntelIndicatorCategory::from(s))
83    }
84}
85impl ThreatIntelIndicatorCategory {
86    /// Returns the `&str` value of the enum member.
87    pub fn as_str(&self) -> &str {
88        match self {
89            ThreatIntelIndicatorCategory::Backdoor => "BACKDOOR",
90            ThreatIntelIndicatorCategory::CardStealer => "CARD_STEALER",
91            ThreatIntelIndicatorCategory::CommandAndControl => "COMMAND_AND_CONTROL",
92            ThreatIntelIndicatorCategory::DropSite => "DROP_SITE",
93            ThreatIntelIndicatorCategory::ExploitSite => "EXPLOIT_SITE",
94            ThreatIntelIndicatorCategory::Keylogger => "KEYLOGGER",
95            ThreatIntelIndicatorCategory::Unknown(value) => value.as_str(),
96        }
97    }
98    /// Returns all the `&str` representations of the enum members.
99    pub const fn values() -> &'static [&'static str] {
100        &[
101            "BACKDOOR",
102            "CARD_STEALER",
103            "COMMAND_AND_CONTROL",
104            "DROP_SITE",
105            "EXPLOIT_SITE",
106            "KEYLOGGER",
107        ]
108    }
109}
110impl ::std::convert::AsRef<str> for ThreatIntelIndicatorCategory {
111    fn as_ref(&self) -> &str {
112        self.as_str()
113    }
114}
115impl ThreatIntelIndicatorCategory {
116    /// Parses the enum value while disallowing unknown variants.
117    ///
118    /// Unknown variants will result in an error.
119    pub fn try_parse(value: &str) -> ::std::result::Result<Self, crate::error::UnknownVariantError> {
120        match Self::from(value) {
121            #[allow(deprecated)]
122            Self::Unknown(_) => ::std::result::Result::Err(crate::error::UnknownVariantError::new(value)),
123            known => Ok(known),
124        }
125    }
126}
127impl ::std::fmt::Display for ThreatIntelIndicatorCategory {
128    fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
129        match self {
130            ThreatIntelIndicatorCategory::Backdoor => write!(f, "BACKDOOR"),
131            ThreatIntelIndicatorCategory::CardStealer => write!(f, "CARD_STEALER"),
132            ThreatIntelIndicatorCategory::CommandAndControl => write!(f, "COMMAND_AND_CONTROL"),
133            ThreatIntelIndicatorCategory::DropSite => write!(f, "DROP_SITE"),
134            ThreatIntelIndicatorCategory::ExploitSite => write!(f, "EXPLOIT_SITE"),
135            ThreatIntelIndicatorCategory::Keylogger => write!(f, "KEYLOGGER"),
136            ThreatIntelIndicatorCategory::Unknown(value) => write!(f, "{}", value),
137        }
138    }
139}