datadog-api-client 0.20.0

Rust client for the Datadog API.
Documentation
// Unless explicitly stated otherwise all files in this repository are licensed under the Apache-2.0 License.
// This product includes software developed at Datadog (https://www.datadoghq.com/).
// Copyright 2019-Present Datadog, Inc.
use serde::de::{Error, MapAccess, Visitor};
use serde::{Deserialize, Deserializer, Serialize};
use serde_with::skip_serializing_none;
use std::fmt::{self, Formatter};

/// Attributes for the AWS scan options.
#[non_exhaustive]
#[skip_serializing_none]
#[derive(Clone, Debug, PartialEq, Serialize)]
pub struct AwsScanOptionsAttributes {
    /// Indicates if scanning of Lambda functions is enabled.
    #[serde(rename = "lambda")]
    pub lambda: Option<bool>,
    /// Indicates if scanning for sensitive data is enabled.
    #[serde(rename = "sensitive_data")]
    pub sensitive_data: Option<bool>,
    /// Indicates if scanning for vulnerabilities in containers is enabled.
    #[serde(rename = "vuln_containers_os")]
    pub vuln_containers_os: Option<bool>,
    /// Indicates if scanning for vulnerabilities in hosts is enabled.
    #[serde(rename = "vuln_host_os")]
    pub vuln_host_os: Option<bool>,
    #[serde(flatten)]
    pub additional_properties: std::collections::BTreeMap<String, serde_json::Value>,
    #[serde(skip)]
    #[serde(default)]
    pub(crate) _unparsed: bool,
}

impl AwsScanOptionsAttributes {
    pub fn new() -> AwsScanOptionsAttributes {
        AwsScanOptionsAttributes {
            lambda: None,
            sensitive_data: None,
            vuln_containers_os: None,
            vuln_host_os: None,
            additional_properties: std::collections::BTreeMap::new(),
            _unparsed: false,
        }
    }

    pub fn lambda(mut self, value: bool) -> Self {
        self.lambda = Some(value);
        self
    }

    pub fn sensitive_data(mut self, value: bool) -> Self {
        self.sensitive_data = Some(value);
        self
    }

    pub fn vuln_containers_os(mut self, value: bool) -> Self {
        self.vuln_containers_os = Some(value);
        self
    }

    pub fn vuln_host_os(mut self, value: bool) -> Self {
        self.vuln_host_os = Some(value);
        self
    }

    pub fn additional_properties(
        mut self,
        value: std::collections::BTreeMap<String, serde_json::Value>,
    ) -> Self {
        self.additional_properties = value;
        self
    }
}

impl Default for AwsScanOptionsAttributes {
    fn default() -> Self {
        Self::new()
    }
}

impl<'de> Deserialize<'de> for AwsScanOptionsAttributes {
    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>
    where
        D: Deserializer<'de>,
    {
        struct AwsScanOptionsAttributesVisitor;
        impl<'a> Visitor<'a> for AwsScanOptionsAttributesVisitor {
            type Value = AwsScanOptionsAttributes;

            fn expecting(&self, f: &mut Formatter<'_>) -> fmt::Result {
                f.write_str("a mapping")
            }

            fn visit_map<M>(self, mut map: M) -> Result<Self::Value, M::Error>
            where
                M: MapAccess<'a>,
            {
                let mut lambda: Option<bool> = None;
                let mut sensitive_data: Option<bool> = None;
                let mut vuln_containers_os: Option<bool> = None;
                let mut vuln_host_os: Option<bool> = None;
                let mut additional_properties: std::collections::BTreeMap<
                    String,
                    serde_json::Value,
                > = std::collections::BTreeMap::new();
                let mut _unparsed = false;

                while let Some((k, v)) = map.next_entry::<String, serde_json::Value>()? {
                    match k.as_str() {
                        "lambda" => {
                            if v.is_null() {
                                continue;
                            }
                            lambda = Some(serde_json::from_value(v).map_err(M::Error::custom)?);
                        }
                        "sensitive_data" => {
                            if v.is_null() {
                                continue;
                            }
                            sensitive_data =
                                Some(serde_json::from_value(v).map_err(M::Error::custom)?);
                        }
                        "vuln_containers_os" => {
                            if v.is_null() {
                                continue;
                            }
                            vuln_containers_os =
                                Some(serde_json::from_value(v).map_err(M::Error::custom)?);
                        }
                        "vuln_host_os" => {
                            if v.is_null() {
                                continue;
                            }
                            vuln_host_os =
                                Some(serde_json::from_value(v).map_err(M::Error::custom)?);
                        }
                        &_ => {
                            if let Ok(value) = serde_json::from_value(v.clone()) {
                                additional_properties.insert(k, value);
                            }
                        }
                    }
                }

                let content = AwsScanOptionsAttributes {
                    lambda,
                    sensitive_data,
                    vuln_containers_os,
                    vuln_host_os,
                    additional_properties,
                    _unparsed,
                };

                Ok(content)
            }
        }

        deserializer.deserialize_any(AwsScanOptionsAttributesVisitor)
    }
}