aws_sdk_securityhub/types/_threat_intel_indicator_category.rs
1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2
3/// When writing a match expression against `ThreatIntelIndicatorCategory`, it is important to ensure
4/// your code is forward-compatible. That is, if a match arm handles a case for a
5/// feature that is supported by the service but has not been represented as an enum
6/// variant in a current version of SDK, your code should continue to work when you
7/// upgrade SDK to a future version in which the enum does include a variant for that
8/// feature.
9///
10/// Here is an example of how you can make a match expression forward-compatible:
11///
12/// ```text
13/// # let threatintelindicatorcategory = unimplemented!();
14/// match threatintelindicatorcategory {
15/// ThreatIntelIndicatorCategory::Backdoor => { /* ... */ },
16/// ThreatIntelIndicatorCategory::CardStealer => { /* ... */ },
17/// ThreatIntelIndicatorCategory::CommandAndControl => { /* ... */ },
18/// ThreatIntelIndicatorCategory::DropSite => { /* ... */ },
19/// ThreatIntelIndicatorCategory::ExploitSite => { /* ... */ },
20/// ThreatIntelIndicatorCategory::Keylogger => { /* ... */ },
21/// other @ _ if other.as_str() == "NewFeature" => { /* handles a case for `NewFeature` */ },
22/// _ => { /* ... */ },
23/// }
24/// ```
25/// The above code demonstrates that when `threatintelindicatorcategory` represents
26/// `NewFeature`, the execution path will lead to the second last match arm,
27/// even though the enum does not contain a variant `ThreatIntelIndicatorCategory::NewFeature`
28/// in the current version of SDK. The reason is that the variable `other`,
29/// created by the `@` operator, is bound to
30/// `ThreatIntelIndicatorCategory::Unknown(UnknownVariantValue("NewFeature".to_owned()))`
31/// and calling `as_str` on it yields `"NewFeature"`.
32/// This match expression is forward-compatible when executed with a newer
33/// version of SDK where the variant `ThreatIntelIndicatorCategory::NewFeature` is defined.
34/// Specifically, when `threatintelindicatorcategory` represents `NewFeature`,
35/// the execution path will hit the second last match arm as before by virtue of
36/// calling `as_str` on `ThreatIntelIndicatorCategory::NewFeature` also yielding `"NewFeature"`.
37///
38/// Explicitly matching on the `Unknown` variant should
39/// be avoided for two reasons:
40/// - The inner data `UnknownVariantValue` is opaque, and no further information can be extracted.
41/// - It might inadvertently shadow other intended match arms.
42///
43#[allow(missing_docs)] // documentation missing in model
44#[non_exhaustive]
45#[derive(
46 ::std::clone::Clone, ::std::cmp::Eq, ::std::cmp::Ord, ::std::cmp::PartialEq, ::std::cmp::PartialOrd, ::std::fmt::Debug, ::std::hash::Hash,
47)]
48pub enum ThreatIntelIndicatorCategory {
49 #[allow(missing_docs)] // documentation missing in model
50 Backdoor,
51 #[allow(missing_docs)] // documentation missing in model
52 CardStealer,
53 #[allow(missing_docs)] // documentation missing in model
54 CommandAndControl,
55 #[allow(missing_docs)] // documentation missing in model
56 DropSite,
57 #[allow(missing_docs)] // documentation missing in model
58 ExploitSite,
59 #[allow(missing_docs)] // documentation missing in model
60 Keylogger,
61 /// `Unknown` contains new variants that have been added since this code was generated.
62 #[deprecated(note = "Don't directly match on `Unknown`. See the docs on this enum for the correct way to handle unknown variants.")]
63 Unknown(crate::primitives::sealed_enum_unknown::UnknownVariantValue),
64}
65impl ::std::convert::From<&str> for ThreatIntelIndicatorCategory {
66 fn from(s: &str) -> Self {
67 match s {
68 "BACKDOOR" => ThreatIntelIndicatorCategory::Backdoor,
69 "CARD_STEALER" => ThreatIntelIndicatorCategory::CardStealer,
70 "COMMAND_AND_CONTROL" => ThreatIntelIndicatorCategory::CommandAndControl,
71 "DROP_SITE" => ThreatIntelIndicatorCategory::DropSite,
72 "EXPLOIT_SITE" => ThreatIntelIndicatorCategory::ExploitSite,
73 "KEYLOGGER" => ThreatIntelIndicatorCategory::Keylogger,
74 other => ThreatIntelIndicatorCategory::Unknown(crate::primitives::sealed_enum_unknown::UnknownVariantValue(other.to_owned())),
75 }
76 }
77}
78impl ::std::str::FromStr for ThreatIntelIndicatorCategory {
79 type Err = ::std::convert::Infallible;
80
81 fn from_str(s: &str) -> ::std::result::Result<Self, <Self as ::std::str::FromStr>::Err> {
82 ::std::result::Result::Ok(ThreatIntelIndicatorCategory::from(s))
83 }
84}
85impl ThreatIntelIndicatorCategory {
86 /// Returns the `&str` value of the enum member.
87 pub fn as_str(&self) -> &str {
88 match self {
89 ThreatIntelIndicatorCategory::Backdoor => "BACKDOOR",
90 ThreatIntelIndicatorCategory::CardStealer => "CARD_STEALER",
91 ThreatIntelIndicatorCategory::CommandAndControl => "COMMAND_AND_CONTROL",
92 ThreatIntelIndicatorCategory::DropSite => "DROP_SITE",
93 ThreatIntelIndicatorCategory::ExploitSite => "EXPLOIT_SITE",
94 ThreatIntelIndicatorCategory::Keylogger => "KEYLOGGER",
95 ThreatIntelIndicatorCategory::Unknown(value) => value.as_str(),
96 }
97 }
98 /// Returns all the `&str` representations of the enum members.
99 pub const fn values() -> &'static [&'static str] {
100 &[
101 "BACKDOOR",
102 "CARD_STEALER",
103 "COMMAND_AND_CONTROL",
104 "DROP_SITE",
105 "EXPLOIT_SITE",
106 "KEYLOGGER",
107 ]
108 }
109}
110impl ::std::convert::AsRef<str> for ThreatIntelIndicatorCategory {
111 fn as_ref(&self) -> &str {
112 self.as_str()
113 }
114}
115impl ThreatIntelIndicatorCategory {
116 /// Parses the enum value while disallowing unknown variants.
117 ///
118 /// Unknown variants will result in an error.
119 pub fn try_parse(value: &str) -> ::std::result::Result<Self, crate::error::UnknownVariantError> {
120 match Self::from(value) {
121 #[allow(deprecated)]
122 Self::Unknown(_) => ::std::result::Result::Err(crate::error::UnknownVariantError::new(value)),
123 known => Ok(known),
124 }
125 }
126}
127impl ::std::fmt::Display for ThreatIntelIndicatorCategory {
128 fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result {
129 match self {
130 ThreatIntelIndicatorCategory::Backdoor => write!(f, "BACKDOOR"),
131 ThreatIntelIndicatorCategory::CardStealer => write!(f, "CARD_STEALER"),
132 ThreatIntelIndicatorCategory::CommandAndControl => write!(f, "COMMAND_AND_CONTROL"),
133 ThreatIntelIndicatorCategory::DropSite => write!(f, "DROP_SITE"),
134 ThreatIntelIndicatorCategory::ExploitSite => write!(f, "EXPLOIT_SITE"),
135 ThreatIntelIndicatorCategory::Keylogger => write!(f, "KEYLOGGER"),
136 ThreatIntelIndicatorCategory::Unknown(value) => write!(f, "{}", value),
137 }
138 }
139}