use serde::de::{Error, MapAccess, Visitor};
use serde::{Deserialize, Deserializer, Serialize};
use serde_with::skip_serializing_none;
use std::fmt::{self, Formatter};
#[non_exhaustive]
#[skip_serializing_none]
#[derive(Clone, Debug, PartialEq, Serialize)]
pub struct SyntheticsSSLCertificate {
#[serde(rename = "cipher")]
pub cipher: Option<String>,
#[serde(rename = "exponent")]
pub exponent: Option<f64>,
#[serde(rename = "extKeyUsage")]
pub ext_key_usage: Option<Vec<String>>,
#[serde(rename = "fingerprint")]
pub fingerprint: Option<String>,
#[serde(rename = "fingerprint256")]
pub fingerprint256: Option<String>,
#[serde(rename = "issuer")]
pub issuer: Option<crate::datadogV1::model::SyntheticsSSLCertificateIssuer>,
#[serde(rename = "modulus")]
pub modulus: Option<String>,
#[serde(rename = "protocol")]
pub protocol: Option<String>,
#[serde(rename = "serialNumber")]
pub serial_number: Option<String>,
#[serde(rename = "subject")]
pub subject: Option<crate::datadogV1::model::SyntheticsSSLCertificateSubject>,
#[serde(rename = "validFrom")]
pub valid_from: Option<chrono::DateTime<chrono::Utc>>,
#[serde(rename = "validTo")]
pub valid_to: Option<chrono::DateTime<chrono::Utc>>,
#[serde(flatten)]
pub additional_properties: std::collections::BTreeMap<String, serde_json::Value>,
#[serde(skip)]
#[serde(default)]
pub(crate) _unparsed: bool,
}
impl SyntheticsSSLCertificate {
pub fn new() -> SyntheticsSSLCertificate {
SyntheticsSSLCertificate {
cipher: None,
exponent: None,
ext_key_usage: None,
fingerprint: None,
fingerprint256: None,
issuer: None,
modulus: None,
protocol: None,
serial_number: None,
subject: None,
valid_from: None,
valid_to: None,
additional_properties: std::collections::BTreeMap::new(),
_unparsed: false,
}
}
pub fn cipher(mut self, value: String) -> Self {
self.cipher = Some(value);
self
}
pub fn exponent(mut self, value: f64) -> Self {
self.exponent = Some(value);
self
}
pub fn ext_key_usage(mut self, value: Vec<String>) -> Self {
self.ext_key_usage = Some(value);
self
}
pub fn fingerprint(mut self, value: String) -> Self {
self.fingerprint = Some(value);
self
}
pub fn fingerprint256(mut self, value: String) -> Self {
self.fingerprint256 = Some(value);
self
}
pub fn issuer(
mut self,
value: crate::datadogV1::model::SyntheticsSSLCertificateIssuer,
) -> Self {
self.issuer = Some(value);
self
}
pub fn modulus(mut self, value: String) -> Self {
self.modulus = Some(value);
self
}
pub fn protocol(mut self, value: String) -> Self {
self.protocol = Some(value);
self
}
pub fn serial_number(mut self, value: String) -> Self {
self.serial_number = Some(value);
self
}
pub fn subject(
mut self,
value: crate::datadogV1::model::SyntheticsSSLCertificateSubject,
) -> Self {
self.subject = Some(value);
self
}
pub fn valid_from(mut self, value: chrono::DateTime<chrono::Utc>) -> Self {
self.valid_from = Some(value);
self
}
pub fn valid_to(mut self, value: chrono::DateTime<chrono::Utc>) -> Self {
self.valid_to = Some(value);
self
}
pub fn additional_properties(
mut self,
value: std::collections::BTreeMap<String, serde_json::Value>,
) -> Self {
self.additional_properties = value;
self
}
}
impl Default for SyntheticsSSLCertificate {
fn default() -> Self {
Self::new()
}
}
impl<'de> Deserialize<'de> for SyntheticsSSLCertificate {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
where
D: Deserializer<'de>,
{
struct SyntheticsSSLCertificateVisitor;
impl<'a> Visitor<'a> for SyntheticsSSLCertificateVisitor {
type Value = SyntheticsSSLCertificate;
fn expecting(&self, f: &mut Formatter<'_>) -> fmt::Result {
f.write_str("a mapping")
}
fn visit_map<M>(self, mut map: M) -> Result<Self::Value, M::Error>
where
M: MapAccess<'a>,
{
let mut cipher: Option<String> = None;
let mut exponent: Option<f64> = None;
let mut ext_key_usage: Option<Vec<String>> = None;
let mut fingerprint: Option<String> = None;
let mut fingerprint256: Option<String> = None;
let mut issuer: Option<crate::datadogV1::model::SyntheticsSSLCertificateIssuer> =
None;
let mut modulus: Option<String> = None;
let mut protocol: Option<String> = None;
let mut serial_number: Option<String> = None;
let mut subject: Option<crate::datadogV1::model::SyntheticsSSLCertificateSubject> =
None;
let mut valid_from: Option<chrono::DateTime<chrono::Utc>> = None;
let mut valid_to: Option<chrono::DateTime<chrono::Utc>> = None;
let mut additional_properties: std::collections::BTreeMap<
String,
serde_json::Value,
> = std::collections::BTreeMap::new();
let mut _unparsed = false;
while let Some((k, v)) = map.next_entry::<String, serde_json::Value>()? {
match k.as_str() {
"cipher" => {
if v.is_null() {
continue;
}
cipher = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"exponent" => {
if v.is_null() {
continue;
}
exponent = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"extKeyUsage" => {
if v.is_null() {
continue;
}
ext_key_usage =
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"fingerprint" => {
if v.is_null() {
continue;
}
fingerprint =
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"fingerprint256" => {
if v.is_null() {
continue;
}
fingerprint256 =
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"issuer" => {
if v.is_null() {
continue;
}
issuer = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"modulus" => {
if v.is_null() {
continue;
}
modulus = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"protocol" => {
if v.is_null() {
continue;
}
protocol = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"serialNumber" => {
if v.is_null() {
continue;
}
serial_number =
Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"subject" => {
if v.is_null() {
continue;
}
subject = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"validFrom" => {
if v.is_null() {
continue;
}
valid_from = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
"validTo" => {
if v.is_null() {
continue;
}
valid_to = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
}
&_ => {
if let Ok(value) = serde_json::from_value(v.clone()) {
additional_properties.insert(k, value);
}
}
}
}
let content = SyntheticsSSLCertificate {
cipher,
exponent,
ext_key_usage,
fingerprint,
fingerprint256,
issuer,
modulus,
protocol,
serial_number,
subject,
valid_from,
valid_to,
additional_properties,
_unparsed,
};
Ok(content)
}
}
deserializer.deserialize_any(SyntheticsSSLCertificateVisitor)
}
}